Vulnerabilites related to mediatek - mt6886
Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 08:04
Summary
In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08037801; Issue ID: ALPS08037801.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4675A09-0147-4690-8AA1-E3802CA1B3EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08037801; Issue ID: ALPS08037801."
    },
    {
      "lang": "es",
      "value": "En el servicio gnss, existe una posible lectura fuera de l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS08037801; ID de la incidencia: ALPS08037801."
    }
  ],
  "id": "CVE-2023-32815",
  "lastModified": "2024-11-21T08:04:05.323",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-04T03:15:13.990",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-11-04 02:15
Modified
2025-04-22 13:54
Summary
In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1574.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1574."
    },
    {
      "lang": "es",
      "value": "En KeyInstall, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08956986; ID de problema: MSV-1574."
    }
  ],
  "id": "CVE-2024-20121",
  "lastModified": "2025-04-22T13:54:35.757",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-04T02:15:17.383",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-01-06 04:15
Modified
2025-04-21 17:13
Summary
In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: MOLY01399339; Issue ID: MSV-1928.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F273033-3332-45C6-B620-A6800D35284C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FE7DBA-479C-402B-8485-9D14E70F25EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9875F3-794F-4D3A-B450-8FEA21ECCB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F419FE2-2D6D-48EE-9B6C-E88AC5D44186",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68AA1CF7-F1CB-44A0-980E-DB32D9E379B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6988:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB95144-97C3-4329-99DB-CB1B6FBB8A2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8863:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E0D738-F0B9-468F-8A10-204F498320BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: MOLY01399339; Issue ID: MSV-1928."
    },
    {
      "lang": "es",
      "value": "En Modem, es posible que se produzca una escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n incorrecta de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios si un actor malintencionado ya ha obtenido el privilegio del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01399339; ID de problema: MSV-1928."
    }
  ],
  "id": "CVE-2024-20151",
  "lastModified": "2025-04-21T17:13:45.390",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-06T04:15:07.413",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-05-06 03:15
Modified
2025-04-30 16:38
Summary
In da, there is a possible escalation of privilege due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541749; Issue ID: ALPS08541754.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In da, there is a possible escalation of privilege due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541749; Issue ID: ALPS08541754."
    },
    {
      "lang": "es",
      "value": "En este caso, existe una posible escalada de privilegios debido a una verificaci\u00f3n de estado incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541749; ID del problema: ALPS08541754."
    }
  ],
  "id": "CVE-2024-20060",
  "lastModified": "2025-04-30T16:38:52.663",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 3.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-05-06T03:15:09.870",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1332"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2025-04-17 16:15
Summary
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358560; Issue ID: ALPS08358560.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358560; Issue ID: ALPS08358560."
    },
    {
      "lang": "es",
      "value": "En keyInstall, existe una posible escalada de privilegios debido a confusi\u00f3n de tipos. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08358560; ID del problema: ALPS08358560."
    }
  ],
  "id": "CVE-2024-20010",
  "lastModified": "2025-04-17T16:15:27.490",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-02-05T06:15:47.387",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-04-06 18:15
Modified
2025-02-12 16:15
Summary
In adsp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07696134; Issue ID: ALPS07696134.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781wifi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC1B2D4B-C7C3-420C-9361-6C056B4BCA9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791wifi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "720F4AA0-6AAE-465F-8F50-F11DD11B5FA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797wifi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BD3FB61-EA42-4D3D-9867-7EBCD0B8F647",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In adsp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07696134; Issue ID: ALPS07696134."
    }
  ],
  "id": "CVE-2023-20681",
  "lastModified": "2025-02-12T16:15:35.610",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-04-06T18:15:09.497",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-06-18 15:15
Summary
In bluetooth service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07933038; Issue ID: MSV-559.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12318A0A-16CD-48A5-98A4-373070734642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00B6513-EDB2-4303-9648-17ECD6DA2083",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8E0661-FCAB-48D7-A7F8-310F9BCF13A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In bluetooth service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07933038; Issue ID: MSV-559."
    },
    {
      "lang": "es",
      "value": "En el servicio Bluetooth, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07933038; ID del problema: MSV-559."
    }
  ],
  "id": "CVE-2023-32891",
  "lastModified": "2025-06-18T15:15:22.103",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:08.633",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2024-09-05 14:28
Summary
In wlan, there is a possible denial of service due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08861558; Issue ID: MSV-1526.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan, there is a possible denial of service due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08861558; Issue ID: MSV-1526."
    },
    {
      "lang": "es",
      "value": "En WLAN, existe una posible denegaci\u00f3n de servicio debido a un manejo incorrecto de errores. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08861558; ID de problema: MSV-1526."
    }
  ],
  "id": "CVE-2024-20089",
  "lastModified": "2024-09-05T14:28:02.713",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-09-02T05:15:15.277",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-703"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-06-16 20:15
Summary
In Modem IMS Stack, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161837; Issue ID: MOLY01161837 (MSV-892).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00B6513-EDB2-4303-9648-17ECD6DA2083",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8E0661-FCAB-48D7-A7F8-310F9BCF13A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem IMS Stack, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161837; Issue ID: MOLY01161837 (MSV-892)."
    },
    {
      "lang": "es",
      "value": "En Modem IMS Stack, existe un posible fallo del sistema debido a una verificaci\u00f3n de l\u00edmites faltantes. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01161837; ID del problema: MOLY01161837 (MSV-892)."
    }
  ],
  "id": "CVE-2023-32887",
  "lastModified": "2025-06-16T20:15:24.233",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:08.450",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        },
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        },
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In GZ, there is a possible information disclosure due to a missing data erasing. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07806008; Issue ID: ALPS07806008.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In GZ, there is a possible information disclosure due to a missing data erasing. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07806008; Issue ID: ALPS07806008."
    },
    {
      "lang": "es",
      "value": "En GZ existe una posible divulgaci\u00f3n de informaci\u00f3n debido a la falta de eliminaci\u00f3n de datos. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07806008; ID del problema: ALPS07806008."
    }
  ],
  "id": "CVE-2023-32858",
  "lastModified": "2024-11-21T08:04:12.033",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.190",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In display drm, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363456; Issue ID: ALPS07363456.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display drm, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363456; Issue ID: ALPS07363456."
    },
    {
      "lang": "es",
      "value": "En display drm, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07363456; ID del problema: ALPS07363456."
    }
  ],
  "id": "CVE-2023-32865",
  "lastModified": "2024-11-21T08:04:13.633",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.533",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-07-08 03:15
Modified
2025-07-09 17:22
Summary
In wlan STA driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09812521; Issue ID: MSV-3421.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DABBC56-5969-45B0-A810-1AD5225866BD",
              "versionEndIncluding": "3.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "140DAC08-96E9-47D3-BC2E-65E999DCFD50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2A6813-7138-441E-A9E4-FF62FCBD797A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7923:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDE0504B-45AB-4A6B-853E-B0AB7717A7EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27CFC9DF-2F4C-469A-8A19-A260B1134CFE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05525018-AFE0-415C-A71C-A77922C7D637",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7932:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12C17AA-F2A3-420D-AEDB-BB4071C9EE05",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0C4D80-28BC-4C4D-B522-AD9EC5222A2E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan STA driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09812521; Issue ID: MSV-3421."
    },
    {
      "lang": "es",
      "value": "En el controlador STA de WLAN, existe una posible lectura fuera de los l\u00edmites debido a una comprobaci\u00f3n incorrecta de los l\u00edmites. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n remota (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: ALPS09812521; ID de problema: MSV-3421."
    }
  ],
  "id": "CVE-2025-20693",
  "lastModified": "2025-07-09T17:22:39.747",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-08T03:15:29.100",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-04-07 04:15
Modified
2025-04-09 15:29
Summary
In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09625423; Issue ID: MSV-3033.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB397DA1-62B3-48FD-B694-9FDA4DA25EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0C4D80-28BC-4C4D-B522-AD9EC5222A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09625423; Issue ID: MSV-3033."
    },
    {
      "lang": "es",
      "value": "En DA, existe una posible escritura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: ALPS09625423; ID de problema: MSV-3033."
    }
  ],
  "id": "CVE-2025-20656",
  "lastModified": "2025-04-09T15:29:43.380",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-07T04:15:19.447",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-04-07 04:15
Modified
2025-04-11 13:06
Summary
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01519028; Issue ID: MSV-2768.
Impacted products
Vendor Product Version
mediatek mt2735_firmware -
mediatek mt2735 -
mediatek mt2737_firmware -
mediatek mt2737 -
mediatek mt6739_firmware -
mediatek mt6739 -
mediatek mt6761_firmware -
mediatek mt6761 -
mediatek mt6762_firmware -
mediatek mt6762 -
mediatek mt6762d_firmware -
mediatek mt6762d -
mediatek mt6762m_firmware -
mediatek mt6762m -
mediatek mt6763_firmware -
mediatek mt6763 -
mediatek mt6765_firmware -
mediatek mt6765 -
mediatek mt6765t_firmware -
mediatek mt6765t -
mediatek mt6767_firmware -
mediatek mt6767 -
mediatek mt6768_firmware -
mediatek mt6768 -
mediatek mt6769_firmware -
mediatek mt6769 -
mediatek mt6769k_firmware -
mediatek mt6769k -
mediatek mt6769s_firmware -
mediatek mt6769s -
mediatek mt6769t_firmware -
mediatek mt6769t -
mediatek mt6769z_firmware -
mediatek mt6769z -
mediatek mt6771_firmware -
mediatek mt6771 -
mediatek mt6779_firmware -
mediatek mt6779 -
mediatek mt6781_firmware -
mediatek mt6781 -
mediatek mt6783_firmware -
mediatek mt6783 -
mediatek mt6785_firmware -
mediatek mt6785 -
mediatek mt6785t_firmware -
mediatek mt6785t -
mediatek mt6785u_firmware -
mediatek mt6785u -
mediatek mt6789_firmware -
mediatek mt6789 -
mediatek mt6813_firmware -
mediatek mt6813 -
mediatek mt6833_firmware -
mediatek mt6833 -
mediatek mt6833p_firmware -
mediatek mt6833p -
mediatek mt6835_firmware -
mediatek mt6835 -
mediatek mt6835t_firmware -
mediatek mt6835t -
mediatek mt6853_firmware -
mediatek mt6853 -
mediatek mt6853t_firmware -
mediatek mt6853t -
mediatek mt6855_firmware -
mediatek mt6855 -
mediatek mt6855t_firmware -
mediatek mt6855t -
mediatek mt6873_firmware -
mediatek mt6873 -
mediatek mt6875_firmware -
mediatek mt6875 -
mediatek mt6875t_firmware -
mediatek mt6875t -
mediatek mt6877_firmware -
mediatek mt6877 -
mediatek mt6877t_firmware -
mediatek mt6877t -
mediatek mt6877tt_firmware -
mediatek mt6877tt -
mediatek mt6878_firmware -
mediatek mt6878 -
mediatek mt6878m_firmware -
mediatek mt6878m -
mediatek mt6879_firmware -
mediatek mt6879 -
mediatek mt6880_firmware -
mediatek mt6880 -
mediatek mt6883_firmware -
mediatek mt6883 -
mediatek mt6885_firmware -
mediatek mt6885 -
mediatek mt6886_firmware -
mediatek mt6886 -
mediatek mt6889_firmware -
mediatek mt6889 -
mediatek mt6890_firmware -
mediatek mt6890 -
mediatek mt6891_firmware -
mediatek mt6891 -
mediatek mt6893_firmware -
mediatek mt6893 -
mediatek mt6895_firmware -
mediatek mt6895 -
mediatek mt6895tt_firmware -
mediatek mt6895tt -
mediatek mt6896_firmware -
mediatek mt6896 -
mediatek mt6897_firmware -
mediatek mt6897 -
mediatek mt6899_firmware -
mediatek mt6899 -
mediatek mt6980_firmware -
mediatek mt6980 -
mediatek mt6980d_firmware -
mediatek mt6980d -
mediatek mt6983_firmware -
mediatek mt6983 -
mediatek mt6983t_firmware -
mediatek mt6983t -
mediatek mt6985_firmware -
mediatek mt6985 -
mediatek mt6985t_firmware -
mediatek mt6985t -
mediatek mt6989_firmware -
mediatek mt6989 -
mediatek mt6989t_firmware -
mediatek mt6989t -
mediatek mt6990_firmware -
mediatek mt6990 -
mediatek mt6991_firmware -
mediatek mt6991 -
mediatek mt8666_firmware -
mediatek mt8666 -
mediatek mt8667_firmware -
mediatek mt8667 -
mediatek mt8673_firmware -
mediatek mt8673 -
mediatek mt8675_firmware -
mediatek mt8675 -
mediatek mt8676_firmware -
mediatek mt8676 -
mediatek mt8678_firmware -
mediatek mt8678 -
mediatek mt8765_firmware -
mediatek mt8765 -
mediatek mt8766_firmware -
mediatek mt8766 -
mediatek mt8768_firmware -
mediatek mt8768 -
mediatek mt8771_firmware -
mediatek mt8771 -
mediatek mt8781_firmware -
mediatek mt8781 -
mediatek mt8786_firmware -
mediatek mt8786 -
mediatek mt8788_firmware -
mediatek mt8788 -
mediatek mt8788e_firmware -
mediatek mt8788e -
mediatek mt8791t_firmware -
mediatek mt8791t -
mediatek mt8796_firmware -
mediatek mt8796 -
mediatek mt8797_firmware -
mediatek mt8797 -
mediatek mt8798_firmware -
mediatek mt8798 -
mediatek mt8863_firmware -
mediatek mt8863 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt2735_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0D40745-FA7E-40DF-BCA6-24CECBB0AE43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt2737_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F4E58C-A9BC-4116-A844-B94C6B6566FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6739_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14B94ECB-CAD4-499C-8959-1713FC5CE423",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6761_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2493FB05-7723-4CDD-AC2A-8B21C4285436",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6762_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "712798EA-AE09-4053-9124-E16E1FB309F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6762d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A307C6DB-5B27-4E76-B054-D2953546259A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6762m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBF1063-8378-4AA9-B21F-3D9CFFFB6964",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0002C537-4268-43CA-B349-BC14F1F0313C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6763_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7545A96-E05D-4A48-818C-5F172C594F54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6765_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43327018-578C-4997-81B9-6DBD3679E40C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6765t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D33F2D1-D2D1-43DC-B21C-F8D5C8AF19F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE80B083-D5A3-418C-9655-C79C9DECB4C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6767_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0ED6AF6-9F84-47AB-8D9D-F5BBFD851093",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3367BA13-9C4D-4CCF-8E71-397F33CFF773",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6768_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16EF9082-FC9B-4790-A79D-AA62C62E4B88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6769_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C435FED6-829E-4788-A61C-92A2250872AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6769k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F8F016-0B0F-44C8-8E9A-23A02ED0F684",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B0EFB31-7B79-4529-A978-FA227D77F9F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6769s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA8E0216-44D5-48E5-983D-1517166A318C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD67454-1786-4BC7-B97E-96898F5FE3AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6769t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05B133C-4842-4753-86A6-6A7AF27F9C43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6769z_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98EC4151-3229-418D-8B6C-7DA4148A435E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1BE913-70AE-49FE-99E9-E996165DF79D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6771_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C98C5B2-1B08-4E46-A845-3B19EE801A9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6779_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C031857-65FD-4644-AF44-F9D09303472D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6781_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F92B7C-A5A3-4F32-B4BF-CBE706D79702",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6783_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21ABBF98-6C62-4C4E-AF1E-4EB94D20544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6785_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2569740E-FAF9-4324-9399-F6C0A03D4C25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6785t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A18DF91-6FBC-4AA3-874A-2B805CC787A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6785u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "792E371B-F090-4C3D-A0F2-C78A4FB87606",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14DD4149-ACBE-47B8-B52E-7CE8EECA3615",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6789_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "524AB96D-4C15-47A6-B276-6B873796E8F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6813_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1CB25C-4643-4239-AE47-B5AE876416ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6833_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA0F3AD5-4D2B-4480-AA79-44EFD4E29348",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6833p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EFAB26-B3EA-4B99-9E9C-65E5C9C6FFB2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6835_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B1D726-8183-4667-B46D-18EF110EA9D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6835t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73D77529-4964-4C35-A59F-77B4BDDCE330",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FE7DBA-479C-402B-8485-9D14E70F25EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6853_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EAA5C86-701B-4116-8A63-EB89B3DC2B93",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6853t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3295E913-2375-4544-9A83-E8B8A09AA5C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6855_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E997ED4F-33F3-4508-9B12-99DBA0D845B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6855t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AF56827-7662-4D83-9E73-E88F5EC1B491",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6873_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E12A313-E835-4912-9392-E33428C1AC78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6875_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5228A4E6-9E36-41E4-A157-3CBA6C79DE06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6875t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91282EE2-B5FE-48E7-9ED2-FC6AE27AF83D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6877_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07F67D59-75F0-4056-BCCE-F7888912CAB3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6877t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFF3BF-9D3F-4A65-8077-98B99B18575F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6877tt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC1EDAC-15A9-42FB-9A84-0B0CD0FEDD09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4D6885-E18C-477F-8B6D-B9E84D9535E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6878_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "207954E6-D413-4762-9F4A-3A147CFB4FE2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6878m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6DF220-C31F-479D-A8D3-125BEA0E1E16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "483B6FB0-D683-4F3C-BA5B-6C9852179854",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6879_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "502901D0-8B2D-449A-A2D6-E8914D5D4239",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6880_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A5C1637-BAC7-47C0-AD84-B0404083A857",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6883_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22321E12-7EB8-46B7-ABB6-23ACC1436EFD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6885_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A6E25F4-C394-4830-8EC3-2AF0563F5032",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6886_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E10F9AFE-9F99-4B91-BF26-49E035FC8079",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6889_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD17D854-2394-483D-B8E2-FDA1BC837DAD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6890_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9AC17B-5ED8-4B58-A7A0-B146DD1DD244",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6891_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "089C2A15-9566-4140-AA86-E8906E05660C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6893_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A272644-3BC4-438B-BAC0-DDF164BF4097",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6895_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "110CBA4A-26A6-4E4E-A0C6-35FA02A6D4AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6895tt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAF47A49-59C2-48C6-9A8F-3386EEE218F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2141B30A-C56F-4831-8FCD-4758DF97AD18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6896_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "662B041E-793C-4F30-A018-6212A4781390",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6897_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A04EA650-730F-4E5D-A0E0-90570CACDD5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6899_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEBA484A-EC07-4D3D-80CD-BDE9E7807F71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6980_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB98938B-ED9E-4459-BA32-B1679E4B0DB7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6980d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63E39158-4501-494C-B989-4572AB72E970",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6983_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "967E956F-07B4-4957-9C84-DDB5C38E5E69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6983t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9C5AF3F-20BA-4224-9B66-B963F52021E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6985_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA30A145-D98E-4DA7-84C7-377402951190",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6985t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E57C9579-723A-49B3-8AEB-B47438259346",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6989_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E495B8EB-C9B5-4F32-AEE2-D2C41C0B292B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6989t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22CD5A7E-F5AB-41FB-9A35-D7F4BF7AE72A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6309AE48-7266-435C-B906-50960F643FC8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6990_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7273471C-6471-43C7-82DE-8551CFC9C39A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt6991_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9DD2119-39E8-4A9C-8E2A-8FB7F92A1001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8666_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC2E651-1240-4250-BE65-AF889B3FB7E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8667_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83A0689-C64C-4741-93C8-96482901C7C7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8673_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84687740-E3E8-4E57-8652-7C13C68E9C81",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8675_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6C0C0F1-A7BA-4CDF-AD61-5E8DF981C9F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8676_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "645D7C99-A0A0-4FB0-97AC-3DA5161A44D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8678_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEC7A7B-6948-4B8A-BFA1-9F9D07043605",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8765_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8101C877-8499-4B45-9478-17A6A242E1B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8766_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "215862D7-BF3D-4955-BCFF-48778190EEB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8768_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "303069C6-F031-4176-9465-46F4134BB423",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8771_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F17C468-79B8-4FD6-8AB2-80E8781EAEEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8781_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E2280E5-F903-4541-8404-9F789CEFF172",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8786_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A514F4-3EAF-45FB-8736-4A015E4DEB4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8788_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62F681-A2D1-4A8B-B087-7835ED500D69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8788e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B4F295-BF35-4A71-8567-CB1B367D80E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF887A-1862-4336-ABFC-371838E1D029",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8791t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D15A887-AC6B-4458-8355-8505742F4FC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8796_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC17C8D-377F-4343-BE7E-359224912061",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8797_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E2FBC8-3C13-4663-8BFF-AA6B66F3F260",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8798_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C91FB79A-E095-40BB-8141-240D69CAB131",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:mt8863_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A3F0E1-3226-4CB5-AE9F-BDA327590107",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt8863:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E0D738-F0B9-468F-8A10-204F498320BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01519028; Issue ID: MSV-2768."
    },
    {
      "lang": "es",
      "value": "En el m\u00f3dem, existe un posible fallo del sistema debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota si un UE se conecta a una estaci\u00f3n base no autorizada controlada por el atacante, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: MOLY01519028; ID de problema: MSV-2768."
    }
  ],
  "id": "CVE-2025-20659",
  "lastModified": "2025-04-11T13:06:13.850",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-07T04:15:19.820",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550103.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550103."
    }
  ],
  "id": "CVE-2023-20782",
  "lastModified": "2024-11-21T07:41:31.023",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-07T04:15:12.720",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In jpeg, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07693193; Issue ID: ALPS07693193.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B3A37B9-F500-4B3C-B77C-B2BD7B015154",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In jpeg, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07693193; Issue ID: ALPS07693193."
    }
  ],
  "id": "CVE-2023-20789",
  "lastModified": "2024-11-21T07:41:31.933",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-07T04:15:13.193",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In pda, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07608514; Issue ID: ALPS07608514.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In pda, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07608514; Issue ID: ALPS07608514."
    },
    {
      "lang": "es",
      "value": "En pda, existe un posible use after free debido a una condici\u00f3n de ejecuci\u00f3n.  Esto podr\u00eda llevar a una escalada local de privilegios con necesidad de privilegios de ejecuci\u00f3n del sistema. No es necesaria la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS07608514; ID del problema: ALPS07608514."
    }
  ],
  "id": "CVE-2023-20834",
  "lastModified": "2024-11-21T07:41:39.160",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:10.063",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        },
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        },
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-06 04:15
Modified
2025-04-29 21:15
Summary
In secmem, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08161762; Issue ID: ALPS08161762.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In secmem, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08161762; Issue ID: ALPS08161762."
    },
    {
      "lang": "es",
      "value": "En secmem, existe una posible corrupci\u00f3n de la memoria debido a una confusi\u00f3n de tipos. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08161762; ID del problema: ALPS08161762."
    }
  ],
  "id": "CVE-2023-32834",
  "lastModified": "2025-04-29T21:15:49.943",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-11-06T04:15:07.843",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In display, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08059081; Issue ID: ALPS08059081.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08059081; Issue ID: ALPS08059081."
    },
    {
      "lang": "es",
      "value": "En display, hay una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08059081; ID del problema: ALPS08059081."
    }
  ],
  "id": "CVE-2023-32861",
  "lastModified": "2024-11-21T08:04:12.480",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.353",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-07-01 05:15
Modified
2025-03-13 19:15
Summary
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08719602; Issue ID: MSV-1412.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:22.03.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A72088-37C7-4820-B650-440FE4848BDD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08719602; Issue ID: MSV-1412."
    },
    {
      "lang": "es",
      "value": "En el servicio gnss, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08719602; ID del problema: MSV-1412."
    }
  ],
  "id": "CVE-2024-20081",
  "lastModified": "2025-03-13T19:15:41.723",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-07-01T05:15:04.520",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-06-03 15:15
Summary
In netdagent, there is a possible information disclosure due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07944011; Issue ID: ALPS07944011.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8192:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "422634C7-D280-4664-AEE2-AA5B6723B836",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B3A37B9-F500-4B3C-B77C-B2BD7B015154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8871:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1F80793-01B7-403A-A5F4-031F82FAC77A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In netdagent, there is a possible information disclosure due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07944011; Issue ID: ALPS07944011."
    },
    {
      "lang": "es",
      "value": "En netdagent, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07944011; ID del problema: ALPS07944011."
    }
  ],
  "id": "CVE-2023-32884",
  "lastModified": "2025-06-03T15:15:31.293",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:08.303",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01130183 (MSV-850).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2EABFE5-4B6F-446C-9DE7-008D47C09ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01130183 (MSV-850)."
    },
    {
      "lang": "es",
      "value": "En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio al recibir mensajes RRC con formato incorrecto, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01128524; ID del problema: MOLY01130183 (MSV-850)."
    }
  ],
  "id": "CVE-2023-32844",
  "lastModified": "2024-11-21T08:04:10.253",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:07.510",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-04-01 03:15
Modified
2025-04-23 13:48
Summary
In audio, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08024748; Issue ID: ALPS08029526.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In audio, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08024748; Issue ID: ALPS08029526."
    },
    {
      "lang": "es",
      "value": "En audio, existe una posible lectura fuera de los l\u00edmites debido a un c\u00e1lculo incorrecto del tama\u00f1o del b\u00fafer. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08024748; ID del problema: ALPS08029526."
    }
  ],
  "id": "CVE-2024-20045",
  "lastModified": "2025-04-23T13:48:02.027",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 2.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-01T03:15:08.103",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826989; Issue ID: ALPS07826989.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826989; Issue ID: ALPS07826989."
    }
  ],
  "id": "CVE-2023-20784",
  "lastModified": "2024-11-21T07:41:31.277",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-07T04:15:12.860",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2024-11-21 08:51
Summary
In telephony, there is a possible escalation of privilege due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08441419; Issue ID: ALPS08441419.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In telephony, there is a possible escalation of privilege due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08441419; Issue ID: ALPS08441419."
    },
    {
      "lang": "es",
      "value": "En telephony, existe una posible escalada de privilegios debido a una omisi\u00f3n de permisos. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08441419; ID del problema: ALPS08441419."
    }
  ],
  "id": "CVE-2024-20015",
  "lastModified": "2024-11-21T08:51:47.987",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.4,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-02-05T06:15:47.580",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-305"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-02 04:15
Modified
2025-04-22 13:54
Summary
In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2023.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "738475DC-9FA8-4034-AB1F-F89C77CE7B41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF887A-1862-4336-ABFC-371838E1D029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8863t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "651ECF0E-F30A-499C-98B4-DCFFFCCEBF6A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2023."
    },
    {
      "lang": "es",
      "value": "En telefon\u00eda, existe la posibilidad de una lectura fuera de los l\u00edmites debido a la falta de una verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09289881; ID de problema: MSV-2023."
    }
  ],
  "id": "CVE-2024-20127",
  "lastModified": "2025-04-22T13:54:09.467",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-02T04:15:04.777",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-11-04 02:15
Modified
2025-04-22 13:54
Summary
In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1575.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1575."
    },
    {
      "lang": "es",
      "value": " En KeyInstall, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08956986; ID de problema: MSV-1575."
    }
  ],
  "id": "CVE-2024-20120",
  "lastModified": "2025-04-22T13:54:39.553",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-04T02:15:17.280",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363632; Issue ID: ALPS07363632.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363632; Issue ID: ALPS07363632."
    },
    {
      "lang": "es",
      "value": "En display drm, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07363632; ID del problema: ALPS07363632."
    }
  ],
  "id": "CVE-2023-32868",
  "lastModified": "2024-11-21T08:04:14.063",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.673",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-01-06 04:15
Modified
2025-04-22 13:50
Summary
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09290940; Issue ID: MSV-2040.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB397DA1-62B3-48FD-B694-9FDA4DA25EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09290940; Issue ID: MSV-2040."
    },
    {
      "lang": "es",
      "value": "En V6 DA, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09290940; ID de problema: MSV-2040."
    }
  ],
  "id": "CVE-2024-20145",
  "lastModified": "2025-04-22T13:50:07.340",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-06T04:15:06.850",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453587; Issue ID: ALPS07453587.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453587; Issue ID: ALPS07453587."
    }
  ],
  "id": "CVE-2023-20815",
  "lastModified": "2024-11-21T07:41:35.487",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-08-07T04:15:14.627",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-05-06 03:15
Modified
2025-03-29 00:15
Summary
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08572601; Issue ID: MSV-1229.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08572601; Issue ID: MSV-1229."
    },
    {
      "lang": "es",
      "value": "En el servicio WLAN, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08572601; ID del problema: MSV-1229."
    }
  ],
  "id": "CVE-2024-20064",
  "lastModified": "2025-03-29T00:15:17.283",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-05-06T03:15:09.940",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-04 03:15
Modified
2025-04-22 20:23
Summary
In vdec, there is a possible permission bypass due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08509508; Issue ID: ALPS08509508.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In vdec, there is a possible permission bypass due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08509508; Issue ID: ALPS08509508."
    },
    {
      "lang": "es",
      "value": "En vdec, existe una posible omisi\u00f3n de permisos debido a una omisi\u00f3n de permisos. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08509508; ID del problema: ALPS08509508."
    }
  ],
  "id": "CVE-2024-20036",
  "lastModified": "2025-04-22T20:23:27.683",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-03-04T03:15:07.717",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-03-03 03:15
Modified
2025-04-22 13:47
Summary
In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09475476; Issue ID: MSV-2599.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09475476; Issue ID: MSV-2599."
    },
    {
      "lang": "es",
      "value": "En KeyInstall, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios si un actor malintencionado ya obtuvo el privilegio de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09475476; ID de problema: MSV-2599."
    }
  ],
  "id": "CVE-2025-20645",
  "lastModified": "2025-04-22T13:47:27.490",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-03-03T03:15:09.293",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-02 04:15
Modified
2025-04-22 13:54
Summary
In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2024.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "738475DC-9FA8-4034-AB1F-F89C77CE7B41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF887A-1862-4336-ABFC-371838E1D029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8863t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "651ECF0E-F30A-499C-98B4-DCFFFCCEBF6A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2024."
    },
    {
      "lang": "es",
      "value": "En telefon\u00eda, existe la posibilidad de una lectura fuera de los l\u00edmites debido a la falta de una verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09289881; ID de problema: MSV-2024."
    }
  ],
  "id": "CVE-2024-20128",
  "lastModified": "2025-04-22T13:54:05.037",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-02T04:15:04.967",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-03-03 03:15
Modified
2025-04-22 13:43
Summary
In da, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291064; Issue ID: MSV-2046.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In da, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291064; Issue ID: MSV-2046."
    },
    {
      "lang": "es",
      "value": "En da, existe una posible lectura fuera de los l\u00edmites debido a un desbordamiento de n\u00fameros enteros. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291064; ID de problema: MSV-2046."
    }
  ],
  "id": "CVE-2025-20653",
  "lastModified": "2025-04-22T13:43:58.053",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.6,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-03-03T03:15:10.170",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017756.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017756."
    }
  ],
  "id": "CVE-2023-20780",
  "lastModified": "2024-11-21T07:41:30.763",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-07T04:15:12.577",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 21:15
Summary
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628540.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628540."
    }
  ],
  "id": "CVE-2023-20742",
  "lastModified": "2025-01-07T21:15:10.920",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-06-06T13:15:14.033",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-01-06 04:15
Modified
2025-04-22 13:50
Summary
In wlan STA driver, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389496 / ALPS09137491; Issue ID: MSV-1835.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "067BC2E4-D44D-4817-861C-8596A497E183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84D6DEDA-E41C-4463-83B3-CA074D7593A0",
              "versionEndIncluding": "2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt3603:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE21866A-505E-4526-A346-60C97DCE080B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "140DAC08-96E9-47D3-BC2E-65E999DCFD50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2A6813-7138-441E-A9E4-FF62FCBD797A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6069CD03-6AB1-4A06-88CF-EFBDEA84CDE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan STA driver, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389496 / ALPS09137491; Issue ID: MSV-1835."
    },
    {
      "lang": "es",
      "value": "En wlan STA driver, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00389496 / ALPS09137491; ID de problema: MSV-1835."
    }
  ],
  "id": "CVE-2024-20146",
  "lastModified": "2025-04-22T13:50:11.693",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-06T04:15:06.963",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07549928.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07549928."
    }
  ],
  "id": "CVE-2023-20756",
  "lastModified": "2024-11-21T07:41:29.093",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:09.983",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-11-04 02:15
Modified
2025-04-22 13:53
Summary
In atci, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09082988; Issue ID: MSV-1774.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In atci, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09082988; Issue ID: MSV-1774."
    },
    {
      "lang": "es",
      "value": " En atci, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09082988; ID de problema: MSV-1774."
    }
  ],
  "id": "CVE-2024-20108",
  "lastModified": "2025-04-22T13:53:18.823",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-04T02:15:16.273",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-06-03 02:15
Modified
2025-04-25 18:37
Summary
In dmc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08668110; Issue ID: MSV-1333.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In dmc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08668110; Issue ID: MSV-1333."
    },
    {
      "lang": "es",
      "value": "En dmc, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08668110; ID del problema: MSV-1333."
    }
  ],
  "id": "CVE-2024-20074",
  "lastModified": "2025-04-25T18:37:43.243",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-06-03T02:15:09.520",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460540; Issue ID: ALPS07460540.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460540; Issue ID: ALPS07460540."
    }
  ],
  "id": "CVE-2023-20818",
  "lastModified": "2024-11-21T07:41:36.080",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-08-07T04:15:14.827",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-06-03 15:15
Summary
In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308612; Issue ID: ALPS08308612.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308612; Issue ID: ALPS08308612."
    },
    {
      "lang": "es",
      "value": "En keyInstall, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08308612; ID del problema: ALPS08308612."
    }
  ],
  "id": "CVE-2023-32876",
  "lastModified": "2025-06-03T15:15:28.200",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:07.937",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In cta, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07978550; Issue ID: ALPS07978550.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In cta, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07978550; Issue ID: ALPS07978550."
    },
    {
      "lang": "es",
      "value": "En cta,existe una posible divulgaci\u00f3n de informaci\u00f3n debido a la falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche:ALPS07978550; ID de la incidencia: ALPS07978550."
    }
  ],
  "id": "CVE-2023-20826",
  "lastModified": "2024-11-21T07:41:37.413",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:09.137",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-05-06 03:15
Modified
2025-04-30 16:39
Summary
In da, there is a possible escalation of privilege due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541749; Issue ID: ALPS08541749.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In da, there is a possible escalation of privilege due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541749; Issue ID: ALPS08541749."
    },
    {
      "lang": "es",
      "value": "En este caso, existe una posible escalada de privilegios debido a una verificaci\u00f3n de estado incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541749; ID del problema: ALPS08541749."
    }
  ],
  "id": "CVE-2024-20059",
  "lastModified": "2025-04-30T16:39:40.817",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-05-06T03:15:09.787",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1332"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-02 03:15
Modified
2024-11-21 08:04
Summary
In camera middleware, there is a possible out of bounds write due to a missing input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993539; Issue ID: ALPS07993544.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In camera middleware, there is a possible out of bounds write due to a missing input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993539; Issue ID: ALPS07993544."
    },
    {
      "lang": "es",
      "value": "En camera middleware, existe una posible escritura fuera de l\u00edmites debido a una validaci\u00f3n de entrada faltante. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07993539; ID del problema: ALPS07993544."
    }
  ],
  "id": "CVE-2023-32826",
  "lastModified": "2024-11-21T08:04:07.340",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-10-02T03:15:10.050",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        },
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-04-01 03:15
Modified
2025-04-23 13:47
Summary
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541765; Issue ID: ALPS08541765.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541765; Issue ID: ALPS08541765."
    },
    {
      "lang": "es",
      "value": "En flashc, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una excepci\u00f3n no detectada. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541757; ID del problema: ALPS08541757."
    }
  ],
  "id": "CVE-2024-20049",
  "lastModified": "2025-04-23T13:47:38.603",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-01T03:15:08.337",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-248"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 21:15
Summary
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628606.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628606."
    }
  ],
  "id": "CVE-2023-20741",
  "lastModified": "2025-01-07T21:15:10.730",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-06-06T13:15:13.873",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In ims service, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937105; Issue ID: ALPS07937105.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ims service, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937105; Issue ID: ALPS07937105."
    },
    {
      "lang": "es",
      "value": "En el servicio ims, existe una posible corrupci\u00f3n de memoria debido a una condici\u00f3n de carrera. Esto podr\u00eda llevar a una escalada local de privilegios con necesidad de privilegios de ejecuci\u00f3n del sistema. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS07937105; ID de la incidencia: ALPS07937105."
    }
  ],
  "id": "CVE-2023-20827",
  "lastModified": "2024-11-21T07:41:37.620",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:09.270",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1298"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-02 04:15
Modified
2025-06-25 14:42
Summary
In Modem, there is a possible out of bonds write due to a mission bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00957388; Issue ID: MSV-1872.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2EABFE5-4B6F-446C-9DE7-008D47C09ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem, there is a possible out of bonds write due to a mission bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00957388; Issue ID: MSV-1872."
    },
    {
      "lang": "es",
      "value": "En Modem, existe la posibilidad de una escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites de misi\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY00957388; ID de problema: MSV-1872."
    }
  ],
  "id": "CVE-2024-20132",
  "lastModified": "2025-06-25T14:42:09.850",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-02T04:15:05.460",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-05-06 03:15
Modified
2025-04-30 16:40
Summary
In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08587881; Issue ID: ALPS08587881.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08587881; Issue ID: ALPS08587881."
    },
    {
      "lang": "es",
      "value": "En keyInstall, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08587881; ID del problema: ALPS08587881."
    }
  ],
  "id": "CVE-2024-20057",
  "lastModified": "2025-04-30T16:40:40.650",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-05-06T03:15:09.640",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-06-06 09:15
Modified
2025-01-08 15:15
Summary
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588531; Issue ID: ALPS07588531.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588531; Issue ID: ALPS07588531."
    }
  ],
  "id": "CVE-2023-20727",
  "lastModified": "2025-01-08T15:15:10.070",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-06-06T09:15:11.160",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2025-03-13 19:15
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08932099; Issue ID: MSV-1543.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08932099; Issue ID: MSV-1543."
    },
    {
      "lang": "es",
      "value": "En keyinstall, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08932099; ID de problema: MSV-1543."
    }
  ],
  "id": "CVE-2024-20088",
  "lastModified": "2025-03-13T19:15:41.937",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-09-02T05:15:15.197",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In pqframework, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629585; Issue ID: ALPS07629584.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In pqframework, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629585; Issue ID: ALPS07629584."
    }
  ],
  "id": "CVE-2023-20767",
  "lastModified": "2024-11-21T07:41:29.917",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:10.340",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 08:04
Summary
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017370; Issue ID: ALPS08017370.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017370; Issue ID: ALPS08017370."
    },
    {
      "lang": "es",
      "value": "En el servicio gnss, existe una posible escritura fuera de l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n.ID de parche: ALPS08017370; ID del problema: ALPS08017370."
    }
  ],
  "id": "CVE-2023-32813",
  "lastModified": "2024-11-21T08:04:05.053",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-04T03:15:13.527",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2025-05-29 14:15
Summary
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08240132; Issue ID: ALPS08240132.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08240132; Issue ID: ALPS08240132."
    },
    {
      "lang": "es",
      "value": "En ril, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08240132; ID del problema: ALPS08240132."
    }
  ],
  "id": "CVE-2023-32854",
  "lastModified": "2025-05-29T14:15:30.987",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.000",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453600; Issue ID: ALPS07453600.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453600; Issue ID: ALPS07453600."
    }
  ],
  "id": "CVE-2023-20817",
  "lastModified": "2024-11-21T07:41:35.890",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-08-07T04:15:14.757",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-07-01 05:15
Modified
2025-03-13 15:15
Summary
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: MSV-1491.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: MSV-1491."
    },
    {
      "lang": "es",
      "value": "En el servicio gnss, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08044040; ID del problema: MSV-1491."
    }
  ],
  "id": "CVE-2024-20079",
  "lastModified": "2025-03-13T15:15:40.513",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-07-01T05:15:04.333",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-04-01 03:15
Modified
2025-04-23 13:47
Summary
In flashc, there is a possible out of bounds write due to an uncaught exception. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541764.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In flashc, there is a possible out of bounds write due to an uncaught exception. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541764."
    },
    {
      "lang": "es",
      "value": "En flashc, existe una posible escritura fuera de los l\u00edmites debido a una excepci\u00f3n no detectada. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541757; ID del problema: ALPS08541764."
    }
  ],
  "id": "CVE-2024-20053",
  "lastModified": "2025-04-23T13:47:12.910",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-01T03:15:08.537",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In pda, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07147572; Issue ID: ALPS07421076.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In pda, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07147572; Issue ID: ALPS07421076."
    }
  ],
  "id": "CVE-2023-20798",
  "lastModified": "2024-11-21T07:41:32.843",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-07T04:15:13.603",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        },
        {
          "lang": "en",
          "value": "CWE-131"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 19:15
Summary
In swpm, there is a possible out of bounds write due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780928.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In swpm, there is a possible out of bounds write due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780928."
    }
  ],
  "id": "CVE-2023-20750",
  "lastModified": "2025-01-07T19:15:29.593",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-06-06T13:15:15.233",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        },
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 19:15
Summary
In swpm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780926.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In swpm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780926."
    }
  ],
  "id": "CVE-2023-20749",
  "lastModified": "2025-01-07T19:15:29.377",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-06-06T13:15:15.023",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 21:15
Summary
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573603; Issue ID: ALPS07573603.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2EECB3C-723A-492D-A6D7-6A1A73EDBFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C79211-F064-499D-914E-0BACD038FBF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E400AB9-B82A-4449-8789-35112940270F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5E73E0-EF8D-4659-B447-66474BC05708",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573603; Issue ID: ALPS07573603."
    }
  ],
  "id": "CVE-2023-20728",
  "lastModified": "2025-01-07T21:15:10.397",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-06-06T13:15:12.070",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In display, there is a possible classic buffer overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929788; Issue ID: ALPS07929788.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display, there is a possible classic buffer overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929788; Issue ID: ALPS07929788."
    },
    {
      "lang": "es",
      "value": "En display, hay un posible desbordamiento del b\u00fafer cl\u00e1sico debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07929788; ID del problema: ALPS07929788."
    }
  ],
  "id": "CVE-2023-32860",
  "lastModified": "2024-11-21T08:04:12.350",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.300",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-02 04:15
Modified
2025-04-22 13:56
Summary
In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1871.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1871."
    },
    {
      "lang": "es",
      "value": "En el m\u00f3dem, existe una posible escalada de privilegios debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01395886; ID de problema: MSV-1871."
    }
  ],
  "id": "CVE-2024-20133",
  "lastModified": "2025-04-22T13:56:23.960",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-02T04:15:05.567",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2025-06-20 20:15
Summary
In alac decoder, there is a possible out of bounds write due to an incorrect error handling. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08441150; Issue ID: ALPS08441150.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5B22E8-3536-4DBC-8E71-3E14FE45A887",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4675A09-0147-4690-8AA1-E3802CA1B3EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In alac decoder, there is a possible out of bounds write due to an incorrect error handling. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08441150; Issue ID: ALPS08441150."
    },
    {
      "lang": "es",
      "value": "En el decodificador alac, existe una posible escritura fuera de los l\u00edmites debido a un manejo incorrecto de errores. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08441150; ID del problema: ALPS08441150."
    }
  ],
  "id": "CVE-2024-20009",
  "lastModified": "2025-06-20T20:15:28.033",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-02-05T06:15:47.330",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453560; Issue ID: ALPS07453560.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453560; Issue ID: ALPS07453560."
    }
  ],
  "id": "CVE-2023-20814",
  "lastModified": "2024-11-21T07:41:35.280",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-08-07T04:15:14.563",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-08 15:15
Summary
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573495; Issue ID: ALPS07573495.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2EECB3C-723A-492D-A6D7-6A1A73EDBFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C79211-F064-499D-914E-0BACD038FBF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E400AB9-B82A-4449-8789-35112940270F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5E73E0-EF8D-4659-B447-66474BC05708",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573495; Issue ID: ALPS07573495."
    }
  ],
  "id": "CVE-2023-20731",
  "lastModified": "2025-01-08T15:15:10.950",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-06-06T13:15:12.413",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-02 04:15
Modified
2025-04-22 13:54
Summary
In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained System privileges. User interaction is not needed for exploitation. Patch ID: ALPS09046782; Issue ID: MSV-1728.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained System privileges. User interaction is not needed for exploitation. Patch ID: ALPS09046782; Issue ID: MSV-1728."
    },
    {
      "lang": "es",
      "value": "En vdec, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09046782; ID de problema: MSV-1728."
    }
  ],
  "id": "CVE-2024-20125",
  "lastModified": "2025-04-22T13:54:17.490",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-02T04:15:04.663",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-05-16 18:16
Summary
In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161830; Issue ID: MOLY01161830 (MSV-894).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00B6513-EDB2-4303-9648-17ECD6DA2083",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8E0661-FCAB-48D7-A7F8-310F9BCF13A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161830; Issue ID: MOLY01161830 (MSV-894)."
    },
    {
      "lang": "es",
      "value": "En Modem IMS Call UA, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites faltantes. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01161830; ID del problema: MOLY01161830 (MSV-894)."
    }
  ],
  "id": "CVE-2023-32888",
  "lastModified": "2025-05-16T18:16:01.257",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:08.493",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-04-01 03:15
Modified
2025-04-23 13:47
Summary
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541761.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541761."
    },
    {
      "lang": "es",
      "value": "En flashc, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una excepci\u00f3n no detectada. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541757; ID del problema: ALPS08541761."
    }
  ],
  "id": "CVE-2024-20052",
  "lastModified": "2025-04-23T13:47:16.587",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-01T03:15:08.490",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-02-03 04:15
Modified
2025-04-22 13:50
Summary
In Bluetooth FW, there is a possible reachable assertion due to improper exception handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389046 (Note: For MT79XX chipsets) / ALPS09136501 (Note: For MT2737, MT3603, MT6XXX, and MT8XXX chipsets); Issue ID: MSV-1797.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "067BC2E4-D44D-4817-861C-8596A497E183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "478606CD-9678-4C35-A0E4-DC973B04D76A",
              "versionEndIncluding": "3.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt3603:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE21866A-505E-4526-A346-60C97DCE080B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "140DAC08-96E9-47D3-BC2E-65E999DCFD50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2A6813-7138-441E-A9E4-FF62FCBD797A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27CFC9DF-2F4C-469A-8A19-A260B1134CFE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05525018-AFE0-415C-A71C-A77922C7D637",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6069CD03-6AB1-4A06-88CF-EFBDEA84CDE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Bluetooth FW, there is a possible reachable assertion due to improper exception handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389046 (Note: For MT79XX chipsets) / ALPS09136501 (Note: For MT2737, MT3603, MT6XXX, and MT8XXX chipsets); Issue ID: MSV-1797."
    },
    {
      "lang": "es",
      "value": "En Bluetooth FW, existe una posible afirmaci\u00f3n de accesibilidad debido a una gesti\u00f3n inadecuada de excepciones. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00389046 (Nota: para conjuntos de chips MT79XX) / ALPS09136501 (Nota: para conjuntos de chips MT2737, MT3603, MT6XXX y MT8XXX); ID de problema: MSV-1797."
    }
  ],
  "id": "CVE-2024-20147",
  "lastModified": "2025-04-22T13:50:37.573",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-02-03T04:15:07.927",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441796; Issue ID: ALPS07441796.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441796; Issue ID: ALPS07441796."
    }
  ],
  "id": "CVE-2023-20772",
  "lastModified": "2024-11-21T07:41:30.257",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:10.467",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 08:04
Summary
In bluetooth driver, there is a possible read and write access to registers due to improper access control of register interface. This could lead to local leak of sensitive information with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07849751; Issue ID: ALPS07849751.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781wifi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC1B2D4B-C7C3-420C-9361-6C056B4BCA9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791wifi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "720F4AA0-6AAE-465F-8F50-F11DD11B5FA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797wifi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BD3FB61-EA42-4D3D-9867-7EBCD0B8F647",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In bluetooth driver, there is a possible read and write access to registers due to improper access control of register interface. This could lead to local leak of sensitive information with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07849751; Issue ID: ALPS07849751."
    },
    {
      "lang": "es",
      "value": "En el controlador Bluetooth, existe un posible acceso de lectura y escritura a los registros debido a un control de acceso inadecuado de la interfaz de registro. Esto podr\u00eda conducir a la fuga local de informaci\u00f3n sensible con privilegios de ejecuci\u00f3n del sistema necesarios. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS07849751; ID de la incidencia: ALPS07849751."
    }
  ],
  "id": "CVE-2023-32808",
  "lastModified": "2024-11-21T08:04:04.250",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-04T03:15:12.840",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017764.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017764."
    },
    {
      "lang": "es",
      "value": "En keyinstall, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una comprobaci\u00f3n de l\u00edmites omitida. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS08017756; ID de la incidencia: ALPS08017764."
    }
  ],
  "id": "CVE-2023-20833",
  "lastModified": "2024-11-21T07:41:38.973",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:10.010",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07588667.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07588667."
    }
  ],
  "id": "CVE-2023-20753",
  "lastModified": "2024-11-21T07:41:28.740",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:09.847",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-04-01 03:15
Modified
2025-04-23 13:48
Summary
In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08360153 (for MT6XXX chipsets) / WCNCR00363530 (for MT79XX chipsets); Issue ID: MSV-979.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:*",
              "matchCriteriaId": "CFDAD450-8799-4C2D-80CE-2AA45DEC35CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AB22996-9C22-4B6C-9E94-E4C055D16335",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5AA441-5381-4179-89EB-1642120F72B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "140DAC08-96E9-47D3-BC2E-65E999DCFD50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2A6813-7138-441E-A9E4-FF62FCBD797A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27CFC9DF-2F4C-469A-8A19-A260B1134CFE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05525018-AFE0-415C-A71C-A77922C7D637",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "490CD97B-021F-4350-AEE7-A2FA866D5889",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40A9E917-4B34-403F-B512-09EEBEA46811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6069CD03-6AB1-4A06-88CF-EFBDEA84CDE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08360153 (for MT6XXX chipsets) / WCNCR00363530 (for MT79XX chipsets); Issue ID: MSV-979."
    },
    {
      "lang": "es",
      "value": "En el firmware WLAN, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08360153 (para conjuntos de chips MT6XXX) / WCNCR00363530 (para conjuntos de chips MT79XX); ID del problema: MSV-979."
    }
  ],
  "id": "CVE-2024-20040",
  "lastModified": "2025-04-23T13:48:30.197",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-01T03:15:07.847",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-04 03:15
Modified
2025-04-22 20:36
Summary
In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541635; Issue ID: ALPS08541635.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF649E18-4DA8-4724-A9B2-575BC01BFACC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69D98D9F-4594-4411-B788-BBD53EE5B227",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541635; Issue ID: ALPS08541635."
    },
    {
      "lang": "es",
      "value": "En flashc, existe una posible escritura fuera de los l\u00edmites debido a la falta de valoraci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541635; ID del problema: ALPS08541635."
    }
  ],
  "id": "CVE-2024-20024",
  "lastModified": "2025-04-22T20:36:49.887",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.2,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-03-04T03:15:07.237",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-03-03 03:15
Modified
2025-04-22 13:46
Summary
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2062.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB397DA1-62B3-48FD-B694-9FDA4DA25EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2062."
    },
    {
      "lang": "es",
      "value": "En da, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291294; ID de problema: MSV-2062."
    }
  ],
  "id": "CVE-2025-20651",
  "lastModified": "2025-04-22T13:46:09.310",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "LOW",
          "baseScore": 4.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 3.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-03-03T03:15:09.950",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-04-01 03:15
Modified
2025-04-23 13:48
Summary
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541746; Issue ID: ALPS08541746.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541746; Issue ID: ALPS08541746."
    },
    {
      "lang": "es",
      "value": "En da, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541746; ID del problema: ALPS08541746."
    }
  ],
  "id": "CVE-2024-20041",
  "lastModified": "2025-04-23T13:48:21.353",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-01T03:15:07.897",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-04-07 04:15
Modified
2025-04-09 15:20
Summary
In DA, there is a possible permission bypass due to a logic error. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09474894; Issue ID: MSV-2597.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2718:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5506327-7DDF-4E88-9EA8-10B8E32F848B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0C4D80-28BC-4C4D-B522-AD9EC5222A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In DA, there is a possible permission bypass due to a logic error. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09474894; Issue ID: MSV-2597."
    },
    {
      "lang": "es",
      "value": "En DA, existe una posible omisi\u00f3n de permisos debido a un error l\u00f3gico. Esto podr\u00eda provocar una escalada local de privilegios si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se requiere la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09474894; ID de problema: MSV-2597."
    }
  ],
  "id": "CVE-2025-20658",
  "lastModified": "2025-04-09T15:20:15.973",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "LOW",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.5,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-07T04:15:19.703",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-04-01 03:15
Modified
2025-04-23 13:47
Summary
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541757.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541757."
    },
    {
      "lang": "es",
      "value": "En flashc, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una excepci\u00f3n no detectada. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541757; ID del problema: ALPS08541757."
    }
  ],
  "id": "CVE-2024-20050",
  "lastModified": "2025-04-23T13:47:32.820",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-01T03:15:08.383",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-922"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 21:15
Summary
In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only); Issue ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only); Issue ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only)."
    }
  ],
  "id": "CVE-2023-20725",
  "lastModified": "2025-01-07T21:15:10.227",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-06-06T13:15:11.937",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07611449; Issue ID: ALPS07441735.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07611449; Issue ID: ALPS07441735."
    }
  ],
  "id": "CVE-2023-20773",
  "lastModified": "2024-11-21T07:41:30.377",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:10.510",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In duraspeed, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07951402; Issue ID: ALPS07951402.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In duraspeed, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07951402; Issue ID: ALPS07951402."
    },
    {
      "lang": "es",
      "value": "En duraspeed, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a la falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS07951402; ID de la incidencia: ALPS07951402."
    }
  ],
  "id": "CVE-2023-20824",
  "lastModified": "2024-11-21T07:41:37.173",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-04T03:15:08.893",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In mmp, there is a possible memory corruption due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07342152; Issue ID: ALPS07342152.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In mmp, there is a possible memory corruption due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07342152; Issue ID: ALPS07342152."
    },
    {
      "lang": "es",
      "value": "En mmp, existe una posible corrupci\u00f3n de la memoria debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07342152; ID del problema: ALPS07342152."
    }
  ],
  "id": "CVE-2023-32866",
  "lastModified": "2024-11-21T08:04:13.787",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.577",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2025-05-29 14:15
Summary
In display drm, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326314; Issue ID: ALPS07326314.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display drm, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326314; Issue ID: ALPS07326314."
    },
    {
      "lang": "es",
      "value": "En display drm, hay una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07326314; ID del problema: ALPS07326314."
    }
  ],
  "id": "CVE-2023-32863",
  "lastModified": "2025-05-29T14:15:31.230",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.440",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-14 03:15
Modified
2025-05-30 17:08
Severity ?
Summary
In Modem, there is a possible memory corruption due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01182594; Issue ID: MSV-1529.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FE7DBA-479C-402B-8485-9D14E70F25EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2141B30A-C56F-4831-8FCD-4758DF97AD18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem, there is a possible memory corruption due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01182594; Issue ID: MSV-1529."
    },
    {
      "lang": "es",
      "value": "En Modem, existe una posible corrupci\u00f3n de la memoria debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01182594; ID del problema: MSV-1529."
    }
  ],
  "id": "CVE-2024-20082",
  "lastModified": "2025-05-30T17:08:54.657",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-08-14T03:15:04.120",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-06-02 03:15
Modified
2025-07-10 17:38
Summary
In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739.
Impacted products
Vendor Product Version
mediatek lr12a -
mediatek lr13 -
mediatek nr15 -
mediatek nr16 -
mediatek nr17 -
mediatek nr17r -
mediatek mt6739 -
mediatek mt6761 -
mediatek mt6762 -
mediatek mt6762d -
mediatek mt6762m -
mediatek mt6763 -
mediatek mt6765 -
mediatek mt6765t -
mediatek mt6767 -
mediatek mt6768 -
mediatek mt6769 -
mediatek mt6769k -
mediatek mt6769s -
mediatek mt6769t -
mediatek mt6769z -
mediatek mt6771 -
mediatek mt6779 -
mediatek mt6781 -
mediatek mt6783 -
mediatek mt6785 -
mediatek mt6785t -
mediatek mt6785u -
mediatek mt6789 -
mediatek mt6813 -
mediatek mt6833 -
mediatek mt6833p -
mediatek mt6835 -
mediatek mt6835t -
mediatek mt6853 -
mediatek mt6853t -
mediatek mt6855 -
mediatek mt6855t -
mediatek mt6873 -
mediatek mt6875 -
mediatek mt6875t -
mediatek mt6877 -
mediatek mt6877t -
mediatek mt6877tt -
mediatek mt6878 -
mediatek mt6878m -
mediatek mt6879 -
mediatek mt6880 -
mediatek mt6883 -
mediatek mt6885 -
mediatek mt6886 -
mediatek mt6889 -
mediatek mt6890 -
mediatek mt6891 -
mediatek mt6893 -
mediatek mt6895 -
mediatek mt6895tt -
mediatek mt6896 -
mediatek mt6897 -
mediatek mt6899 -
mediatek mt6980 -
mediatek mt6983 -
mediatek mt6983t -
mediatek mt6985 -
mediatek mt6985t -
mediatek mt6989 -
mediatek mt6989t -
mediatek mt6990 -
mediatek mt6991 -
mediatek mt8666 -
mediatek mt8667 -
mediatek mt8673 -
mediatek mt8675 -
mediatek mt8676 -
mediatek mt8678 -
mediatek mt8765 -
mediatek mt8766 -
mediatek mt8766r -
mediatek mt8768 -
mediatek mt8771 -
mediatek mt8781 -
mediatek mt8786 -
mediatek mt8788 -
mediatek mt8788e -
mediatek mt8789 -
mediatek mt8791 -
mediatek mt8791t -
mediatek mt8795t -
mediatek mt8797 -
mediatek mt8798 -
mediatek mt8863 -
mediatek mt8873 -
mediatek mt8883 -
mediatek mt8893 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12318A0A-16CD-48A5-98A4-373070734642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC63582A-F9A5-4450-A263-CE1FD4B4F3AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0002C537-4268-43CA-B349-BC14F1F0313C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE80B083-D5A3-418C-9655-C79C9DECB4C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3367BA13-9C4D-4CCF-8E71-397F33CFF773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B0EFB31-7B79-4529-A978-FA227D77F9F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD67454-1786-4BC7-B97E-96898F5FE3AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1BE913-70AE-49FE-99E9-E996165DF79D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14DD4149-ACBE-47B8-B52E-7CE8EECA3615",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FE7DBA-479C-402B-8485-9D14E70F25EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4D6885-E18C-477F-8B6D-B9E84D9535E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "483B6FB0-D683-4F3C-BA5B-6C9852179854",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2141B30A-C56F-4831-8FCD-4758DF97AD18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6309AE48-7266-435C-B906-50960F643FC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "738475DC-9FA8-4034-AB1F-F89C77CE7B41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF887A-1862-4336-ABFC-371838E1D029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8863:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E0D738-F0B9-468F-8A10-204F498320BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DD525F-7050-42BD-829D-1121698B8009",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23DD8281-FEB4-4E23-8DDA-680FF895F12E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739."
    },
    {
      "lang": "es",
      "value": "En el servicio ims, existe un posible fallo del sistema debido a una gesti\u00f3n incorrecta de errores. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota si un UE se conecta a una estaci\u00f3n base no autorizada controlada por el atacante, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: MOLY01394606; ID de problema: MSV-2739."
    }
  ],
  "id": "CVE-2025-20678",
  "lastModified": "2025-07-10T17:38:15.050",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-06-02T03:15:25.230",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-674"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-02 03:15
Modified
2024-11-21 08:04
Summary
In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2EECB3C-723A-492D-A6D7-6A1A73EDBFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mediatek:iot_yocto:23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9ED712-53EF-4AF7-AB45-A87B50F6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:*",
              "matchCriteriaId": "CFDAD450-8799-4C2D-80CE-2AA45DEC35CE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "518D4593-D5E2-489C-92C3-343716A621E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C79211-F064-499D-914E-0BACD038FBF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E400AB9-B82A-4449-8789-35112940270F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6069CD03-6AB1-4A06-88CF-EFBDEA84CDE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637."
    },
    {
      "lang": "es",
      "value": "En wlan firmware, existe una posible afirmaci\u00f3n del firmware debido a un manejo inadecuado de la entrada. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07932637; ID del problema: ALPS07932637."
    }
  ],
  "id": "CVE-2023-32820",
  "lastModified": "2024-11-21T08:04:06.150",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-10-02T03:15:09.823",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292228; Issue ID: ALPS07292228.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292228; Issue ID: ALPS07292228."
    }
  ],
  "id": "CVE-2023-20774",
  "lastModified": "2024-11-21T07:41:30.513",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:10.550",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-04-01 03:15
Modified
2025-04-23 13:47
Summary
In flashc, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541758.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In flashc, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541758."
    },
    {
      "lang": "es",
      "value": "En flashc, existe una posible falla del sistema debido a una excepci\u00f3n no detectada. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local con los privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541757; ID del problema: ALPS08541758."
    }
  ],
  "id": "CVE-2024-20051",
  "lastModified": "2025-04-23T13:47:26.270",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 2.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-01T03:15:08.437",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453589; Issue ID: ALPS07453589.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453589; Issue ID: ALPS07453589."
    }
  ],
  "id": "CVE-2023-20816",
  "lastModified": "2024-11-21T07:41:35.693",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-08-07T04:15:14.693",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-06 04:15
Modified
2024-11-21 07:41
Summary
In 5G NRLC, there is a possible invalid memory access due to lack of error handling. This could lead to remote denial of service, if UE received invalid 1-byte rlc sdu, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00921261; Issue ID: MOLY01128895.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In 5G NRLC, there is a possible invalid memory access due to lack of error handling. This could lead to remote denial of service, if UE received invalid 1-byte rlc sdu, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00921261; Issue ID: MOLY01128895."
    },
    {
      "lang": "es",
      "value": "En 5G NRLC, existe un posible acceso no v\u00e1lido a la memoria debido a la falta de manejo de errores. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio, si el UE recibiera un rlc sdu de 1 byte no v\u00e1lido, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY00921261; ID del problema: MOLY01128895."
    }
  ],
  "id": "CVE-2023-20702",
  "lastModified": "2024-11-21T07:41:22.977",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-11-06T04:15:07.653",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07864900; Issue ID: ALPS07864900.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07864900; Issue ID: ALPS07864900."
    }
  ],
  "id": "CVE-2023-20795",
  "lastModified": "2024-11-21T07:41:32.317",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-08-07T04:15:13.393",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-02 03:15
Modified
2024-11-21 08:04
Summary
In camera middleware, there is a possible out of bounds write due to a missing input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993539; Issue ID: ALPS07993539.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In camera middleware, there is a possible out of bounds write due to a missing input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993539; Issue ID: ALPS07993539."
    },
    {
      "lang": "es",
      "value": "En camera middleware, existe una posible escritura fuera de l\u00edmites debido a una validaci\u00f3n de entrada faltante. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07993539; ID del problema: ALPS07993539."
    }
  ],
  "id": "CVE-2023-32827",
  "lastModified": "2024-11-21T08:04:07.560",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-10-02T03:15:10.097",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        },
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-02 04:15
Modified
2025-04-22 13:55
Summary
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09121847; Issue ID: MSV-1821.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB397DA1-62B3-48FD-B694-9FDA4DA25EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09121847; Issue ID: MSV-1821."
    },
    {
      "lang": "es",
      "value": "En da, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09121847; ID de problema: MSV-1821."
    }
  ],
  "id": "CVE-2024-20136",
  "lastModified": "2025-04-22T13:55:43.890",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.2,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-02T04:15:05.920",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560793; Issue ID: ALPS07560793.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560793; Issue ID: ALPS07560793."
    },
    {
      "lang": "es",
      "value": "En display drm, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07560793; ID del problema: ALPS07560793."
    }
  ],
  "id": "CVE-2023-32867",
  "lastModified": "2024-11-21T08:04:13.913",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.623",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014144.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014144."
    },
    {
      "lang": "es",
      "value": "en gps,existe una posible escritura fuera de l\u00edmites debido a una comprobaci\u00f3n de l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08014144; ID del problema: ALPS08014144."
    }
  ],
  "id": "CVE-2023-20828",
  "lastModified": "2024-11-21T07:41:37.877",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:09.413",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In rpmb, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07648764; Issue ID: ALPS07648764.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In rpmb, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07648764; Issue ID: ALPS07648764."
    },
    {
      "lang": "es",
      "value": "En rpmb, existe una posible escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07648764; ID del problema: ALPS07648764."
    }
  ],
  "id": "CVE-2023-32853",
  "lastModified": "2024-11-21T08:04:11.440",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:07.950",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In display drm, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363740; Issue ID: ALPS07363740.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display drm, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363740; Issue ID: ALPS07363740."
    },
    {
      "lang": "es",
      "value": "En display drm, hay una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07363740; ID del problema: ALPS07363740."
    }
  ],
  "id": "CVE-2023-32870",
  "lastModified": "2024-11-21T08:04:14.310",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.760",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2025-05-09 17:15
Summary
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566."
    },
    {
      "lang": "es",
      "value": "En keyInstall, existe una posible escalada de privilegios debido a confusi\u00f3n de tipos. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08358566; ID del problema: ALPS08358566."
    }
  ],
  "id": "CVE-2024-20012",
  "lastModified": "2025-05-09T17:15:49.990",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-02-05T06:15:47.490",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 08:04
Summary
In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441589; Issue ID: ALPS07441589.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mediatek:iot_yocto:23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9ED712-53EF-4AF7-AB45-A87B50F6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441589; Issue ID: ALPS07441589."
    },
    {
      "lang": "es",
      "value": "En el controlador wlan, existe una posible escritura fuera de l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda llevar a una escalada local de privilegios con necesidad de privilegios de ejecuci\u00f3n del sistema. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS07441589; ID de la incidencia: ALPS07441589. "
    }
  ],
  "id": "CVE-2023-32806",
  "lastModified": "2024-11-21T08:04:03.890",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:12.393",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-02 04:15
Modified
2025-04-22 13:56
Summary
In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09193374; Issue ID: MSV-1982.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09193374; Issue ID: MSV-1982."
    },
    {
      "lang": "es",
      "value": "En el estado de encendido, es posible que se produzca una escritura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09193374; ID de problema: MSV-1982."
    }
  ],
  "id": "CVE-2024-20130",
  "lastModified": "2025-04-22T13:56:31.350",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-02T04:15:05.190",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-121"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-15 22:15
Modified
2025-01-24 19:15
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581668; Issue ID: ALPS07581668.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581668; Issue ID: ALPS07581668."
    }
  ],
  "id": "CVE-2023-20711",
  "lastModified": "2025-01-24T19:15:11.540",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-05-15T22:15:11.150",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-06-03 15:15
Summary
In Engineer Mode, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08282249; Issue ID: ALPS08282249.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Engineer Mode, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08282249; Issue ID: ALPS08282249."
    },
    {
      "lang": "es",
      "value": "En Engineer Mode, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08282249; ID del problema: ALPS08282249."
    }
  ],
  "id": "CVE-2023-32883",
  "lastModified": "2025-06-03T15:15:30.633",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:08.260",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-06 04:15
Modified
2024-11-21 08:04
Summary
In bluethooth service, there is a possible out of bounds reads due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07884130; Issue ID: ALPS07884130.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In bluethooth service, there is a possible out of bounds reads due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07884130; Issue ID: ALPS07884130."
    },
    {
      "lang": "es",
      "value": "En el servicio Bluetooth, existe una posible lectura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07884130; ID del problema: ALPS07884130."
    }
  ],
  "id": "CVE-2023-32825",
  "lastModified": "2024-11-21T08:04:07.203",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-06T04:15:07.757",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01128524 (MSV-846).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2EABFE5-4B6F-446C-9DE7-008D47C09ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01128524 (MSV-846)."
    },
    {
      "lang": "es",
      "value": "En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio al recibir mensajes RRC con formato incorrecto, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01128524; ID del problema: MOLY01128524 (MSV-846)."
    }
  ],
  "id": "CVE-2023-32841",
  "lastModified": "2024-11-21T08:04:09.867",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:07.347",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-06-03 02:15
Modified
2025-04-25 18:39
Summary
In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08698617; Issue ID: MSV-1394.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08698617; Issue ID: MSV-1394."
    },
    {
      "lang": "es",
      "value": "En telefon\u00eda existe una posible divulgaci\u00f3n de informaci\u00f3n debido a la falta de una verificaci\u00f3n de permiso. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08698617; ID del problema: MSV-1394."
    }
  ],
  "id": "CVE-2024-20065",
  "lastModified": "2025-04-25T18:39:04.767",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-06-03T02:15:08.463",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-05-05 03:15
Modified
2025-05-12 18:15
Summary
In devinfo, there is a possible information disclosure due to a missing SELinux policy. This could lead to local information disclosure of device identifier with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09555228; Issue ID: MSV-2760.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0C4D80-28BC-4C4D-B522-AD9EC5222A2E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF887A-1862-4336-ABFC-371838E1D029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In devinfo, there is a possible information disclosure due to a missing SELinux policy. This could lead to local information disclosure of device identifier with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09555228; Issue ID: MSV-2760."
    },
    {
      "lang": "es",
      "value": "En devinfo, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a la falta de una pol\u00edtica de SELinux. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local del identificador del dispositivo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: ALPS09555228; ID de problema: MSV-2760."
    }
  ],
  "id": "CVE-2025-20665",
  "lastModified": "2025-05-12T18:15:44.080",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-05T03:15:21.803",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-538"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453549; Issue ID: ALPS07453549.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453549; Issue ID: ALPS07453549."
    }
  ],
  "id": "CVE-2023-20813",
  "lastModified": "2024-11-21T07:41:35.083",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-08-07T04:15:14.500",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-06-16 19:15
Summary
In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08304217.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08304217."
    },
    {
      "lang": "es",
      "value": "En keyInstall, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08308607; ID del problema: ALPS08304217."
    }
  ],
  "id": "CVE-2023-32875",
  "lastModified": "2025-06-16T19:15:21.480",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:07.883",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767811; Issue ID: ALPS07767811.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767811; Issue ID: ALPS07767811."
    }
  ],
  "id": "CVE-2023-20786",
  "lastModified": "2024-11-21T07:41:31.530",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-07T04:15:12.990",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937113; Issue ID: ALPS07937113.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937113; Issue ID: ALPS07937113."
    },
    {
      "lang": "es",
      "value": "En nvram, existe una posible escritura fuera de l\u00edmites debido a una inexistente comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda llevar a una escalada local de privilegios con necesidad de privilegios de ejecuci\u00f3n del sistema. No es necesaria la interacci\u00f3n del usuario para la explotaci\u00f3n. ID del parche: ALPS07937113; ID de la incidencia: ALPS07937113."
    }
  ],
  "id": "CVE-2023-20821",
  "lastModified": "2024-11-21T07:41:36.663",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:08.480",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 08:04
Summary
In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: ALPS08044032.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: ALPS08044032."
    },
    {
      "lang": "es",
      "value": "En el servicio gnss, existe una posible lectura fuera de l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS08044040; ID de la incidencia: ALPS08044032. "
    }
  ],
  "id": "CVE-2023-32816",
  "lastModified": "2024-11-21T08:04:05.470",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-04T03:15:14.220",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-02 04:15
Modified
2025-04-22 13:56
Summary
In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1873.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F273033-3332-45C6-B620-A6800D35284C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FE7DBA-479C-402B-8485-9D14E70F25EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9875F3-794F-4D3A-B450-8FEA21ECCB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F419FE2-2D6D-48EE-9B6C-E88AC5D44186",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68AA1CF7-F1CB-44A0-980E-DB32D9E379B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6988:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB95144-97C3-4329-99DB-CB1B6FBB8A2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1873."
    },
    {
      "lang": "es",
      "value": "En el m\u00f3dem, existe una posible escalada de privilegios debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01395886; ID de problema: MSV-1873."
    }
  ],
  "id": "CVE-2024-20131",
  "lastModified": "2025-04-22T13:56:27.550",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-02T04:15:05.337",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014156.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014156."
    },
    {
      "lang": "es",
      "value": "En gps, existe una posible escritura fuera de los l\u00edmites debido a una falta de verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n.ID de parche: ALPS08014144; ID del problema: ALPS08014156."
    }
  ],
  "id": "CVE-2023-20830",
  "lastModified": "2024-11-21T07:41:38.323",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:09.650",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-01-06 04:15
Modified
2025-04-22 13:50
Severity ?
Summary
In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "067BC2E4-D44D-4817-861C-8596A497E183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA0981E-8869-4546-88A5-6D750549EBFB",
              "versionEndIncluding": "2.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt3603:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE21866A-505E-4526-A346-60C97DCE080B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "140DAC08-96E9-47D3-BC2E-65E999DCFD50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2A6813-7138-441E-A9E4-FF62FCBD797A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6069CD03-6AB1-4A06-88CF-EFBDEA84CDE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796."
    },
    {
      "lang": "es",
      "value": "En WLAN STA FW, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00389045 / ALPS09136494; ID de problema: MSV-1796."
    }
  ],
  "id": "CVE-2024-20148",
  "lastModified": "2025-04-22T13:50:16.450",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-06T04:15:07.077",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573237; Issue ID: ALPS07573202.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573237; Issue ID: ALPS07573202."
    }
  ],
  "id": "CVE-2023-20766",
  "lastModified": "2024-11-21T07:41:29.787",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:10.287",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07536951; Issue ID: ALPS07536951.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07536951; Issue ID: ALPS07536951."
    }
  ],
  "id": "CVE-2023-20748",
  "lastModified": "2024-11-21T07:41:28.127",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:09.803",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-08-04 02:15
Modified
2025-08-18 15:42
Summary
In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09915215; Issue ID: MSV-3801.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB397DA1-62B3-48FD-B694-9FDA4DA25EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zephyrproject:zephyr:3.7.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "8FA9F6FC-E722-428B-BB01-E9082DBF9A32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0C4D80-28BC-4C4D-B522-AD9EC5222A2E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09915215; Issue ID: MSV-3801."
    },
    {
      "lang": "es",
      "value": "En DA, existe una posible escritura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: ALPS09915215; ID de problema: MSV-3801."
    }
  ],
  "id": "CVE-2025-20696",
  "lastModified": "2025-08-18T15:42:28.783",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-08-04T02:15:25.940",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-04 03:15
Modified
2025-04-22 20:18
Summary
In nvram, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08499945; Issue ID: ALPS08499945.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In nvram, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08499945; Issue ID: ALPS08499945."
    },
    {
      "lang": "es",
      "value": "En nvram, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08499945; ID del problema: ALPS08499945."
    }
  ],
  "id": "CVE-2024-20033",
  "lastModified": "2025-04-22T20:18:33.123",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-03-04T03:15:07.630",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-02 04:15
Modified
2025-03-13 18:15
Summary
In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2025.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "738475DC-9FA8-4034-AB1F-F89C77CE7B41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF887A-1862-4336-ABFC-371838E1D029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8863t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "651ECF0E-F30A-499C-98B4-DCFFFCCEBF6A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2025."
    },
    {
      "lang": "es",
      "value": "En telefon\u00eda, existe la posibilidad de una lectura fuera de los l\u00edmites debido a la falta de una verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09289881; ID de problema: MSV-2025."
    }
  ],
  "id": "CVE-2024-20129",
  "lastModified": "2025-03-13T18:15:37.080",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-02T04:15:05.073",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014148.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014148."
    },
    {
      "lang": "es",
      "value": "En GPS, existe una posible escritura fuera de l\u00edmites debido a una inexistente comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda llevar a una escalada local de privilegios con necesidad de privilegios de ejecuci\u00f3n del sistema. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS08014144; ID de la incidencia: ALPS08014148."
    }
  ],
  "id": "CVE-2023-20829",
  "lastModified": "2024-11-21T07:41:38.107",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:09.527",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628604; Issue ID: ALPS07628582.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628604; Issue ID: ALPS07628582."
    }
  ],
  "id": "CVE-2023-20761",
  "lastModified": "2024-11-21T07:41:29.673",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:10.233",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-07-01 05:15
Modified
2025-05-28 20:12
Severity ?
Summary
In gnss service, there is a possible escalation of privilege due to improper certificate validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08720039; Issue ID: MSV-1424.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gnss service, there is a possible escalation of privilege due to improper certificate validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08720039; Issue ID: MSV-1424."
    },
    {
      "lang": "es",
      "value": "En el servicio gnss existe una posible escalada de privilegios debido a una validaci\u00f3n inadecuada del certificado. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08720039; ID del problema: MSV-1424."
    }
  ],
  "id": "CVE-2024-20080",
  "lastModified": "2025-05-28T20:12:04.643",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-07-01T05:15:04.430",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-04-01 03:15
Modified
2025-04-23 13:47
Summary
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541769; Issue ID: ALPS08541769.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541769; Issue ID: ALPS08541769."
    },
    {
      "lang": "es",
      "value": "En flashc, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una excepci\u00f3n no detectada. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541757; ID del problema: ALPS08541757."
    }
  ],
  "id": "CVE-2024-20048",
  "lastModified": "2025-04-23T13:47:45.370",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.2,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-01T03:15:08.280",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-248"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-05-06 03:15
Modified
2025-04-30 16:41
Summary
In preloader, there is a possible escalation of privilege due to an insecure default value. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528185; Issue ID: ALPS08528185.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In preloader, there is a possible escalation of privilege due to an insecure default value. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528185; Issue ID: ALPS08528185."
    },
    {
      "lang": "es",
      "value": "En el preloader, existe una posible escalada de privilegios debido a un valor predeterminado inseguro. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08528185; ID del problema: ALPS08528185."
    }
  ],
  "id": "CVE-2024-20056",
  "lastModified": "2025-04-30T16:41:39.733",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-05-06T03:15:09.563",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-02-03 04:15
Modified
2025-03-18 14:15
Summary
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01289384; Issue ID: MSV-2436.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC63582A-F9A5-4450-A263-CE1FD4B4F3AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FE7DBA-479C-402B-8485-9D14E70F25EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "483B6FB0-D683-4F3C-BA5B-6C9852179854",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2141B30A-C56F-4831-8FCD-4758DF97AD18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6309AE48-7266-435C-B906-50960F643FC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8863:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E0D738-F0B9-468F-8A10-204F498320BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01289384; Issue ID: MSV-2436."
    },
    {
      "lang": "es",
      "value": "En el m\u00f3dem, existe una posible escritura fuera de los l\u00edmites debido a un neutra. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo, si un UE se ha conectado a una estaci\u00f3n base no autorizada controlada por el atacante, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01289384; ID de problema: MSV-2436."
    }
  ],
  "id": "CVE-2025-20634",
  "lastModified": "2025-03-18T14:15:41.747",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-02-03T04:15:08.423",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2024-10-27 03:35
Summary
In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944204; Issue ID: MSV-1560.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B405E0-E094-48F4-951B-96132898F72F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D36D1D8-C428-438F-A773-150B30A8EBFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:22.03.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A72088-37C7-4820-B650-440FE4848BDD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944204; Issue ID: MSV-1560."
    },
    {
      "lang": "es",
      "value": "En estado de encendido, es posible que se produzca una lectura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08944204; ID de problema: MSV-1560."
    }
  ],
  "id": "CVE-2024-20085",
  "lastModified": "2024-10-27T03:35:00.897",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-09-02T05:15:14.933",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-02 03:15
Modified
2024-11-21 07:41
Summary
In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.
Impacted products
Vendor Product Version
mediatek lr11 -
mediatek lr12a -
mediatek lr13 -
mediatek nr15 -
mediatek nr16 -
mediatek nr17 -
mediatek mt2731 -
mediatek mt6570 -
mediatek mt6580 -
mediatek mt6595 -
mediatek mt6732 -
mediatek mt6735 -
mediatek mt6737 -
mediatek mt6737m -
mediatek mt6738 -
mediatek mt6739 -
mediatek mt6750 -
mediatek mt6750s -
mediatek mt6752 -
mediatek mt6753 -
mediatek mt6755 -
mediatek mt6757 -
mediatek mt6758 -
mediatek mt6761 -
mediatek mt6762 -
mediatek mt6762d -
mediatek mt6762m -
mediatek mt6763 -
mediatek mt6765 -
mediatek mt6765t -
mediatek mt6767 -
mediatek mt6768 -
mediatek mt6769 -
mediatek mt6769t -
mediatek mt6769z -
mediatek mt6771 -
mediatek mt6775 -
mediatek mt6779 -
mediatek mt6781 -
mediatek mt6783 -
mediatek mt6785 -
mediatek mt6785t -
mediatek mt6789 -
mediatek mt6795 -
mediatek mt6797 -
mediatek mt6799 -
mediatek mt6813 -
mediatek mt6815 -
mediatek mt6833 -
mediatek mt6835 -
mediatek mt6853 -
mediatek mt6855 -
mediatek mt6873 -
mediatek mt6875 -
mediatek mt6875t -
mediatek mt6877 -
mediatek mt6878 -
mediatek mt6879 -
mediatek mt6883 -
mediatek mt6885 -
mediatek mt6886 -
mediatek mt6889 -
mediatek mt6891 -
mediatek mt6893 -
mediatek mt6895 -
mediatek mt6895t -
mediatek mt6896 -
mediatek mt6897 -
mediatek mt6983 -
mediatek mt6985 -
mediatek mt6989 -
mediatek mt8666 -
mediatek mt8666a -
mediatek mt8667 -
mediatek mt8673 -
mediatek mt8675 -
mediatek mt8765 -
mediatek mt8766 -
mediatek mt8766z -
mediatek mt8768 -
mediatek mt8768a -
mediatek mt8768b -
mediatek mt8768t -
mediatek mt8768z -
mediatek mt8781 -
mediatek mt8786 -
mediatek mt8788 -
mediatek mt8788t -
mediatek mt8788x -
mediatek mt8788z -
mediatek mt8791 -
mediatek mt8791t -
mediatek mt8797 -
mediatek mt8798 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEBC79B-E936-4499-8B2D-C6619C51B755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12318A0A-16CD-48A5-98A4-373070734642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6528FA05-C8B7-498B-93BE-0BEFED28C1FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "975802CC-B130-4CF3-9B8E-A23DEA464259",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42CCA9-A835-4871-A129-B83573713AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E3152A6-982E-415E-9F19-1CB2F6D11850",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6738:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99735131-D437-40AA-9EDB-31DC61DD15DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0002C537-4268-43CA-B349-BC14F1F0313C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE80B083-D5A3-418C-9655-C79C9DECB4C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3367BA13-9C4D-4CCF-8E71-397F33CFF773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1BE913-70AE-49FE-99E9-E996165DF79D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C387CFFD-BAE4-4626-8AC3-7C9CFB6819FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF649E18-4DA8-4724-A9B2-575BC01BFACC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F25CBBB-B600-4A54-8653-4C60CD125353",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D039235C-D84C-4E9B-9D01-16A24E95FE79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D99E26E-A551-428C-90FF-0F6CDE28C1A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21CA41B1-2BAF-43DE-AD79-396FA5125695",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02B6E7E0-8BD2-4BA1-948F-3F5A95B989F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0165F48B-B11A-4A8B-859B-083D239270FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4DE760A-BF65-4917-B571-1382C6703271",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE75D73-582B-48BF-B38A-3F9626338C7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003."
    },
    {
      "lang": "es",
      "value": "En el CDMA PPP protocol, existe una posible escritura fuera de l\u00edmites debido a una verificaci\u00f3n de l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01068234; ID del problema: ALPS08010003."
    }
  ],
  "id": "CVE-2023-20819",
  "lastModified": "2024-11-21T07:41:36.283",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-10-02T03:15:09.710",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-02 03:15
Modified
2024-11-21 08:04
Summary
In ftm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07994229; Issue ID: ALPS07994229.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ftm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07994229; Issue ID: ALPS07994229."
    },
    {
      "lang": "es",
      "value": "En ftm, existe una posible escritura fuera de l\u00edmites debido a una verificaci\u00f3n de l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07994229; ID del problema: ALPS07994229."
    }
  ],
  "id": "CVE-2023-32822",
  "lastModified": "2024-11-21T08:04:06.523",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-10-02T03:15:09.917",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2025-05-15 20:15
Summary
In mp3 decoder, there is a possible out of bounds write due to a race condition. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08441369; Issue ID: ALPS08441369.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In mp3 decoder, there is a possible out of bounds write due to a race condition. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08441369; Issue ID: ALPS08441369."
    },
    {
      "lang": "es",
      "value": "En el decodificador de mp3, existe una posible escritura fuera de los l\u00edmites debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08441369; ID del problema: ALPS08441369."
    }
  ],
  "id": "CVE-2024-20007",
  "lastModified": "2025-05-15T20:15:41.590",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-02-05T06:15:47.283",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        },
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In camera middleware, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629582; Issue ID: ALPS07629582.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In camera middleware, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629582; Issue ID: ALPS07629582."
    }
  ],
  "id": "CVE-2023-20797",
  "lastModified": "2024-11-21T07:41:32.650",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-08-07T04:15:13.537",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01139296 (MSV-860).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2EABFE5-4B6F-446C-9DE7-008D47C09ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01139296 (MSV-860)."
    },
    {
      "lang": "es",
      "value": "En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio al recibir mensajes RRC con formato incorrecto, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01128524; ID del problema: MOLY01139296 (MSV-860)."
    }
  ],
  "id": "CVE-2023-32845",
  "lastModified": "2024-11-21T08:04:10.380",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:07.567",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07588343.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07588343."
    }
  ],
  "id": "CVE-2023-20754",
  "lastModified": "2024-11-21T07:41:28.860",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:09.893",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-02-03 04:15
Modified
2025-03-13 20:15
Summary
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09403752; Issue ID: MSV-2434.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB397DA1-62B3-48FD-B694-9FDA4DA25EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:22.03.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A72088-37C7-4820-B650-440FE4848BDD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09403752; Issue ID: MSV-2434."
    },
    {
      "lang": "es",
      "value": "En V6 DA, existe una posible escritura fuera de los l\u00edmites debido a un neutra. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09403752; ID de problema: MSV-2434."
    }
  ],
  "id": "CVE-2025-20635",
  "lastModified": "2025-03-13T20:15:25.597",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-02-03T04:15:08.540",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2024-11-21 08:04
Summary
In modem EMM, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01183647; Issue ID: MOLY01183647 (MSV-963).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12318A0A-16CD-48A5-98A4-373070734642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00B6513-EDB2-4303-9648-17ECD6DA2083",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8E0661-FCAB-48D7-A7F8-310F9BCF13A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In modem EMM, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01183647; Issue ID: MOLY01183647 (MSV-963)."
    },
    {
      "lang": "es",
      "value": "En el modem EMM, existe un posible fallo del sistema debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01183647; ID del problema: MOLY01183647 (MSV-963)."
    }
  ],
  "id": "CVE-2023-32890",
  "lastModified": "2024-11-21T08:04:16.913",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:08.587",
  "references": [
    {
      "source": "security@mediatek.com",
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826905; Issue ID: ALPS07826905.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826905; Issue ID: ALPS07826905."
    }
  ],
  "id": "CVE-2023-20783",
  "lastModified": "2024-11-21T07:41:31.147",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-07T04:15:12.793",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In audio, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08241940; Issue ID: ALPS08241940.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In audio, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08241940; Issue ID: ALPS08241940."
    },
    {
      "lang": "es",
      "value": "En audio, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08241940; ID del problema: ALPS08241940."
    }
  ],
  "id": "CVE-2023-32847",
  "lastModified": "2024-11-21T08:04:10.647",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:07.663",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014162.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014162."
    },
    {
      "lang": "es",
      "value": "En gps, existe una posible escritura fuera de l\u00edmites debido a una comprobaci\u00f3n de l\u00edmites omitida. Esto podr\u00eda llevar a una escalada local de privilegios con necesidad de privilegios de ejecuci\u00f3n del sistema. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS08014144; ID de la incidencia: ALPS08014162. "
    }
  ],
  "id": "CVE-2023-20831",
  "lastModified": "2024-11-21T07:41:38.537",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:09.770",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 08:04
Summary
In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: ALPS08044035.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: ALPS08044035."
    },
    {
      "lang": "es",
      "value": "En el servicio gnss, existe una posible lectura fuera de l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS08044040; ID de la incidencia:  ALPS08044035."
    }
  ],
  "id": "CVE-2023-32817",
  "lastModified": "2024-11-21T08:04:05.610",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-04T03:15:14.277",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01138453 (MSV-861).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2EABFE5-4B6F-446C-9DE7-008D47C09ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01138453 (MSV-861)."
    },
    {
      "lang": "es",
      "value": "En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio al recibir mensajes RRC con formato incorrecto, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01128524; ID del problema: MOLY01138453 (MSV-861)."
    }
  ],
  "id": "CVE-2023-32846",
  "lastModified": "2024-11-21T08:04:10.520",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:07.613",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-04-17 19:15
Summary
In Modem IMS Stack, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161803; Issue ID: MOLY01161803 (MSV-893).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12318A0A-16CD-48A5-98A4-373070734642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00B6513-EDB2-4303-9648-17ECD6DA2083",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8E0661-FCAB-48D7-A7F8-310F9BCF13A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem IMS Stack, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161803; Issue ID: MOLY01161803 (MSV-893)."
    },
    {
      "lang": "es",
      "value": "En Modem IMS Stack, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites faltantes. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01161803; ID del problema: MOLY01161803 (MSV-893)."
    }
  ],
  "id": "CVE-2023-32874",
  "lastModified": "2025-04-17T19:15:55.677",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:07.833",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-04-01 03:15
Modified
2025-04-23 13:48
Summary
In modem protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01240012; Issue ID: MSV-1215.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12318A0A-16CD-48A5-98A4-373070734642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6528FA05-C8B7-498B-93BE-0BEFED28C1FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt3967:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F7108A7-4925-45DF-8705-04F147DB5CF2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2EABFE5-4B6F-446C-9DE7-008D47C09ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0002C537-4268-43CA-B349-BC14F1F0313C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE80B083-D5A3-418C-9655-C79C9DECB4C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3367BA13-9C4D-4CCF-8E71-397F33CFF773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1BE913-70AE-49FE-99E9-E996165DF79D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14DD4149-ACBE-47B8-B52E-7CE8EECA3615",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F419FE2-2D6D-48EE-9B6C-E88AC5D44186",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68AA1CF7-F1CB-44A0-980E-DB32D9E379B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In modem protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01240012; Issue ID: MSV-1215."
    },
    {
      "lang": "es",
      "value": "En el protocolo de m\u00f3dem, existe una posible escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01240012; ID del problema: MSV-1215."
    }
  ],
  "id": "CVE-2024-20039",
  "lastModified": "2025-04-23T13:48:41.747",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-01T03:15:07.780",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-06-18 15:15
Summary
In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161825; Issue ID: MOLY01161825 (MSV-895).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161825; Issue ID: MOLY01161825 (MSV-895)."
    },
    {
      "lang": "es",
      "value": "En Modem IMS Call UA, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites faltantes. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01161825; ID del problema: MOLY01161825 (MSV-895)."
    }
  ],
  "id": "CVE-2023-32889",
  "lastModified": "2025-06-18T15:15:21.873",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:08.540",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In duraspeed, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07951402; Issue ID: ALPS07951413.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In duraspeed, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07951402; Issue ID: ALPS07951413."
    },
    {
      "lang": "es",
      "value": "En duraspeed, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a la falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS07951402; ID de la incidencia: ALPS07951413."
    }
  ],
  "id": "CVE-2023-20825",
  "lastModified": "2024-11-21T07:41:37.290",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-04T03:15:09.023",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-08-04 02:15
Modified
2025-08-18 15:41
Summary
In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915400; Issue ID: MSV-3793.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2718:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5506327-7DDF-4E88-9EA8-10B8E32F848B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8186:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4932D34-06F4-49D7-81FB-772A82E8A5B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0C4D80-28BC-4C4D-B522-AD9EC5222A2E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8391:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43B2824E-8D18-4DD7-91E7-41578B2FCD6C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF887A-1862-4336-ABFC-371838E1D029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DD525F-7050-42BD-829D-1121698B8009",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23DD8281-FEB4-4E23-8DDA-680FF895F12E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915400; Issue ID: MSV-3793."
    },
    {
      "lang": "es",
      "value": "En Power HAL, existe una posible escritura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios si un agente malicioso ya ha obtenido privilegios de System. No se requiere la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09915400; ID de problema: MSV-3793."
    }
  ],
  "id": "CVE-2025-20698",
  "lastModified": "2025-08-18T15:41:58.840",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-08-04T02:15:27.010",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-11-04 02:15
Modified
2025-04-24 15:05
Summary
In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09073261; Issue ID: MSV-1772.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB397DA1-62B3-48FD-B694-9FDA4DA25EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09073261; Issue ID: MSV-1772."
    },
    {
      "lang": "es",
      "value": "En da, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09073261; ID de problema: MSV-1772."
    }
  ],
  "id": "CVE-2024-20104",
  "lastModified": "2025-04-24T15:05:49.900",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-04T02:15:15.940",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In power, there is a possible memory corruption due to an incorrect bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929790; Issue ID: ALPS07929790.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In power, there is a possible memory corruption due to an incorrect bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929790; Issue ID: ALPS07929790."
    }
  ],
  "id": "CVE-2023-20796",
  "lastModified": "2024-11-21T07:41:32.533",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-07T04:15:13.457",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-05-06 03:15
Modified
2025-05-05 16:57
Summary
In DA, there is a possible permission bypass due to an incorrect status check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355514; Issue ID: ALPS08355514.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In DA, there is a possible permission bypass due to an incorrect status check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355514; Issue ID: ALPS08355514."
    },
    {
      "lang": "es",
      "value": "En DA, existe una posible omisi\u00f3n de permiso debido a una verificaci\u00f3n de estado incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08355514; ID del problema: ALPS08355514."
    }
  ],
  "id": "CVE-2023-32871",
  "lastModified": "2025-05-05T16:57:14.013",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-05-06T03:15:09.273",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-391"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-03-03 03:15
Modified
2025-04-22 13:46
Summary
In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2061.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB397DA1-62B3-48FD-B694-9FDA4DA25EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2061."
    },
    {
      "lang": "es",
      "value": "En da, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291294; ID de problema: MSV-2061."
    }
  ],
  "id": "CVE-2025-20650",
  "lastModified": "2025-04-22T13:46:22.380",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-03-03T03:15:09.840",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-06 04:15
Modified
2025-04-24 16:15
Summary
In keyinstall, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08157918; Issue ID: ALPS08157918.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08157918; Issue ID: ALPS08157918."
    },
    {
      "lang": "es",
      "value": "En keyinstall, existe una posible corrupci\u00f3n de memoria debido a confusi\u00f3n de tipos. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08157918; ID del problema: ALPS08157918."
    }
  ],
  "id": "CVE-2023-32835",
  "lastModified": "2025-04-24T16:15:24.900",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-11-06T04:15:07.887",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-15 22:15
Modified
2025-01-24 15:15
Summary
In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only); Issue ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdkb:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "295DD4FC-E943-412D-A63E-260C0F3887FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6528FA05-C8B7-498B-93BE-0BEFED28C1FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3367BA13-9C4D-4CCF-8E71-397F33CFF773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only); Issue ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only)."
    }
  ],
  "id": "CVE-2023-20726",
  "lastModified": "2025-01-24T15:15:09.850",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-05-15T22:15:11.433",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-01-06 04:15
Modified
2025-04-22 13:50
Summary
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2041.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB397DA1-62B3-48FD-B694-9FDA4DA25EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2041."
    },
    {
      "lang": "es",
      "value": "En V6 DA, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09167056; ID de problema: MSV-2041."
    }
  ],
  "id": "CVE-2024-20144",
  "lastModified": "2025-04-22T13:50:01.453",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-06T04:15:06.743",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-03-03 03:15
Modified
2025-04-22 13:48
Summary
In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4D6885-E18C-477F-8B6D-B9E84D9535E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2141B30A-C56F-4831-8FCD-4758DF97AD18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6309AE48-7266-435C-B906-50960F643FC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747."
    },
    {
      "lang": "es",
      "value": "En el m\u00f3dem, existe una posible corrupci\u00f3n de memoria debido a una gesti\u00f3n incorrecta de errores. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota, si un UE se ha conectado a una estaci\u00f3n base no autorizada controlada por el atacante, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01525673; ID de problema: MSV-2747."
    }
  ],
  "id": "CVE-2025-20644",
  "lastModified": "2025-04-22T13:48:09.680",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-03-03T03:15:09.173",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1286"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363632; Issue ID: ALPS07363689.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363632; Issue ID: ALPS07363689."
    },
    {
      "lang": "es",
      "value": "En display drm, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07363632; ID del problema: ALPS07363689."
    }
  ],
  "id": "CVE-2023-32869",
  "lastModified": "2024-11-21T08:04:14.190",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.717",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 08:04
Summary
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local esclation of privileges with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017365; Issue ID: ALPS08017365.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local esclation of privileges with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017365; Issue ID: ALPS08017365."
    },
    {
      "lang": "es",
      "value": "En el servicio gnss, existe una posible escritura fuera de l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con necesidad de privilegios de ejecuci\u00f3n del sistema. No es necesaria la interacci\u00f3n del usuario para la explotaci\u00f3n. ID del parche: ALPS08017365; ID de la incidencia: ALPS08017365. "
    }
  ],
  "id": "CVE-2023-32812",
  "lastModified": "2024-11-21T08:04:04.843",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:13.440",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-06 04:15
Modified
2024-11-21 08:04
Summary
In modem CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction may be also needed for exploitation Patch ID: MOLY01138425; Issue ID: MOLY01138425 (MSV-862).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6528FA05-C8B7-498B-93BE-0BEFED28C1FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3367BA13-9C4D-4CCF-8E71-397F33CFF773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1BE913-70AE-49FE-99E9-E996165DF79D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8D4D6DB-C22A-470D-B799-651E7FB9B602",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00B6513-EDB2-4303-9648-17ECD6DA2083",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8E0661-FCAB-48D7-A7F8-310F9BCF13A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In modem CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction may be also needed for exploitation Patch ID: MOLY01138425; Issue ID: MOLY01138425 (MSV-862)."
    },
    {
      "lang": "es",
      "value": "En modem CCCI, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. Tambi\u00e9n puede ser necesaria la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01138425; ID del problema: MOLY01138425 (MSV-862)."
    }
  ],
  "id": "CVE-2023-32840",
  "lastModified": "2024-11-21T08:04:09.620",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.6,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-11-06T04:15:08.097",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2025-06-20 20:15
Summary
In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08471742; Issue ID: ALPS08308608.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08471742; Issue ID: ALPS08308608."
    },
    {
      "lang": "es",
      "value": "En keyInstall, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08471742; ID del problema: ALPS08308608."
    }
  ],
  "id": "CVE-2024-20013",
  "lastModified": "2025-06-20T20:15:28.473",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-02-05T06:15:47.530",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-04 03:15
Modified
2025-04-22 20:23
Summary
In pq, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495932; Issue ID: ALPS08495932.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In pq, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495932; Issue ID: ALPS08495932."
    },
    {
      "lang": "es",
      "value": "En pq, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08495932; ID del problema: ALPS08495932."
    }
  ],
  "id": "CVE-2024-20038",
  "lastModified": "2025-04-22T20:23:48.507",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.4,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 2.5,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-03-04T03:15:07.800",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-04 03:15
Modified
2025-03-13 14:15
Summary
In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdkb:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "295DD4FC-E943-412D-A63E-260C0F3887FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255."
    },
    {
      "lang": "es",
      "value": "En lk, existe una posible escalada de privilegios debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08528255; ID del problema: ALPS08528255."
    }
  ],
  "id": "CVE-2024-20022",
  "lastModified": "2025-03-13T14:15:20.120",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-03-04T03:15:07.150",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D36D1D8-C428-438F-A773-150B30A8EBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410."
    }
  ],
  "id": "CVE-2023-20775",
  "lastModified": "2024-11-21T07:41:30.643",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:10.590",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 08:04
Summary
In bluetooth driver, there is a possible read and write access to registers due to improper access control of register interface. This could lead to local leak of sensitive information with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07849753; Issue ID: ALPS07849753.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781wifi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC1B2D4B-C7C3-420C-9361-6C056B4BCA9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791wifi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "720F4AA0-6AAE-465F-8F50-F11DD11B5FA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797wifi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BD3FB61-EA42-4D3D-9867-7EBCD0B8F647",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In bluetooth driver, there is a possible read and write access to registers due to improper access control of register interface. This could lead to local leak of sensitive information with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07849753; Issue ID: ALPS07849753."
    },
    {
      "lang": "es",
      "value": "En bluetooth driver, existe un posible acceso de lectura y escritura a los registros debido a un control de acceso inadecuado de la interfaz de registro. Esto podr\u00eda provocar una fuga local de informaci\u00f3n confidencial que requiera privilegios de ejecuci\u00f3n del sistema. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07849753; ID del problema: ALPS07849753."
    }
  ],
  "id": "CVE-2023-32809",
  "lastModified": "2024-11-21T08:04:04.380",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-04T03:15:13.023",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-06-03 15:15
Summary
In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00730807; Issue ID: MOLY00730807.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00B6513-EDB2-4303-9648-17ECD6DA2083",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8E0661-FCAB-48D7-A7F8-310F9BCF13A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00730807; Issue ID: MOLY00730807."
    },
    {
      "lang": "es",
      "value": "En el m\u00f3dem IMS SMS UA, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites faltantes. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY00730807; ID del problema: MOLY00730807."
    }
  ],
  "id": "CVE-2023-32886",
  "lastModified": "2025-06-03T15:15:31.613",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:08.400",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-01-06 04:15
Modified
2025-04-22 13:49
Summary
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB397DA1-62B3-48FD-B694-9FDA4DA25EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069."
    },
    {
      "lang": "es",
      "value": "En V6 DA, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09167056; ID de problema: MSV-2069."
    }
  ],
  "id": "CVE-2024-20143",
  "lastModified": "2025-04-22T13:49:57.393",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-06T04:15:06.630",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-08 15:15
Summary
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573480; Issue ID: ALPS07573480.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2EECB3C-723A-492D-A6D7-6A1A73EDBFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C79211-F064-499D-914E-0BACD038FBF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E400AB9-B82A-4449-8789-35112940270F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5E73E0-EF8D-4659-B447-66474BC05708",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573480; Issue ID: ALPS07573480."
    }
  ],
  "id": "CVE-2023-20732",
  "lastModified": "2025-01-08T15:15:11.213",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-06-06T13:15:12.563",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-15 22:15
Modified
2025-01-23 22:15
Summary
In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only); Issue ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only); Issue ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only)."
    }
  ],
  "id": "CVE-2023-20695",
  "lastModified": "2025-01-23T22:15:10.563",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-05-15T22:15:10.523",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In display, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07388762; Issue ID: ALPS07388762.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07388762; Issue ID: ALPS07388762."
    },
    {
      "lang": "es",
      "value": "En display, hay una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07388762; ID del problema: ALPS07388762."
    }
  ],
  "id": "CVE-2023-32862",
  "lastModified": "2024-11-21T08:04:13.270",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.397",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 08:04
Summary
In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08031947; Issue ID: ALPS08031947.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08031947; Issue ID: ALPS08031947."
    },
    {
      "lang": "es",
      "value": "En el servicio gnss, existe una posible lectura fuera de l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS08031947; ID de la incidencia: ALPS08031947.  "
    }
  ],
  "id": "CVE-2023-32814",
  "lastModified": "2024-11-21T08:04:05.183",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-04T03:15:13.783",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-01-06 04:15
Modified
2025-04-22 13:50
Summary
In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01412526; Issue ID: MSV-2018.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12318A0A-16CD-48A5-98A4-373070734642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3367BA13-9C4D-4CCF-8E71-397F33CFF773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B0EFB31-7B79-4529-A978-FA227D77F9F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD67454-1786-4BC7-B97E-96898F5FE3AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1BE913-70AE-49FE-99E9-E996165DF79D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14DD4149-ACBE-47B8-B52E-7CE8EECA3615",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FE7DBA-479C-402B-8485-9D14E70F25EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4D6885-E18C-477F-8B6D-B9E84D9535E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "483B6FB0-D683-4F3C-BA5B-6C9852179854",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FC6FBA-54B7-4F06-A9CA-939455387175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED414E75-91F0-4A98-9EE1-D072B7A72F8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2141B30A-C56F-4831-8FCD-4758DF97AD18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6309AE48-7266-435C-B906-50960F643FC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF887A-1862-4336-ABFC-371838E1D029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8863:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E0D738-F0B9-468F-8A10-204F498320BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01412526; Issue ID: MSV-2018."
    },
    {
      "lang": "es",
      "value": "En Modem, es posible que se produzca un bloqueo del sistema debido a un error l\u00f3gico. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01412526; ID de problema: MSV-2018."
    }
  ],
  "id": "CVE-2024-20150",
  "lastModified": "2025-04-22T13:50:21.513",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-06T04:15:07.307",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-502"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-502"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-11-04 02:15
Modified
2025-04-24 15:04
Summary
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09124360; Issue ID: MSV-1823.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB397DA1-62B3-48FD-B694-9FDA4DA25EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09124360; Issue ID: MSV-1823."
    },
    {
      "lang": "es",
      "value": " En da, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09124360; ID de problema: MSV-1823."
    }
  ],
  "id": "CVE-2024-20107",
  "lastModified": "2025-04-24T15:04:22.253",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.2,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-04T02:15:16.163",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-11-04 02:15
Modified
2025-04-22 13:52
Summary
In isp, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09071481; Issue ID: MSV-1730.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In isp, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09071481; Issue ID: MSV-1730."
    },
    {
      "lang": "es",
      "value": " En ISP, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local con privilegios de ejecuci\u00f3n de System necesarios. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09071481; ID de problema: MSV-1730."
    }
  ],
  "id": "CVE-2024-20112",
  "lastModified": "2025-04-22T13:52:45.073",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-04T02:15:16.653",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-01-06 04:15
Modified
2025-04-21 17:12
Summary
In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "067BC2E4-D44D-4817-861C-8596A497E183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA0981E-8869-4546-88A5-6D750549EBFB",
              "versionEndIncluding": "2.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt3603:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE21866A-505E-4526-A346-60C97DCE080B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "140DAC08-96E9-47D3-BC2E-65E999DCFD50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2A6813-7138-441E-A9E4-FF62FCBD797A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6069CD03-6AB1-4A06-88CF-EFBDEA84CDE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798."
    },
    {
      "lang": "es",
      "value": "En wlan STA driver, existe una posible aserci\u00f3n alcanzable debido a una gesti\u00f3n inadecuada de excepciones. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local si un actor malintencionado ya obtuvo el privilegio de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00389047 / ALPS09136505; ID de problema: MSV-1798."
    }
  ],
  "id": "CVE-2024-20152",
  "lastModified": "2025-04-21T17:12:10.883",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-06T04:15:07.527",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-04 03:15
Modified
2025-04-22 20:23
Summary
In pq, there is a possible write-what-where condition due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495937; Issue ID: ALPS08495937.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In pq, there is a possible write-what-where condition due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495937; Issue ID: ALPS08495937."
    },
    {
      "lang": "es",
      "value": "En pq, existe una posible condici\u00f3n de escritura en qu\u00e9 y d\u00f3nde debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08495937; ID del problema: ALPS08495937."
    }
  ],
  "id": "CVE-2024-20037",
  "lastModified": "2025-04-22T20:23:37.533",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-03-04T03:15:07.760",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-02-03 04:15
Modified
2025-03-19 18:15
Summary
In secmem, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09403554; Issue ID: MSV-2431.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In secmem, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09403554; Issue ID: MSV-2431."
    },
    {
      "lang": "es",
      "value": "En secmem, existe una posible escritura fuera de los l\u00edmites debido a un neutra. Esto podr\u00eda provocar una escalada local de privilegios si un actor malintencionado ya obtuvo el privilegio System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09403554; ID de problema: MSV-2431."
    }
  ],
  "id": "CVE-2025-20636",
  "lastModified": "2025-03-19T18:15:24.400",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-02-03T04:15:08.643",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07740194; Issue ID: ALPS07740194.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07740194; Issue ID: ALPS07740194."
    }
  ],
  "id": "CVE-2023-20790",
  "lastModified": "2024-11-21T07:41:32.050",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-07T04:15:13.263",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-05-05 03:15
Modified
2025-05-12 18:15
Summary
In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741.
Impacted products
Vendor Product Version
mediatek lr12a -
mediatek lr13 -
mediatek nr15 -
mediatek nr16 -
mediatek nr17 -
mediatek nr17r -
mediatek mt2735 -
mediatek mt2737 -
mediatek mt6739 -
mediatek mt6761 -
mediatek mt6762 -
mediatek mt6762d -
mediatek mt6762m -
mediatek mt6763 -
mediatek mt6765 -
mediatek mt6765t -
mediatek mt6767 -
mediatek mt6768 -
mediatek mt6769 -
mediatek mt6769k -
mediatek mt6769s -
mediatek mt6769t -
mediatek mt6769z -
mediatek mt6771 -
mediatek mt6779 -
mediatek mt6781 -
mediatek mt6783 -
mediatek mt6785 -
mediatek mt6785t -
mediatek mt6785u -
mediatek mt6789 -
mediatek mt6813 -
mediatek mt6833 -
mediatek mt6833p -
mediatek mt6835 -
mediatek mt6835t -
mediatek mt6853 -
mediatek mt6853t -
mediatek mt6855 -
mediatek mt6855t -
mediatek mt6873 -
mediatek mt6875 -
mediatek mt6875t -
mediatek mt6877 -
mediatek mt6877t -
mediatek mt6877tt -
mediatek mt6878 -
mediatek mt6878m -
mediatek mt6879 -
mediatek mt6880 -
mediatek mt6883 -
mediatek mt6885 -
mediatek mt6886 -
mediatek mt6889 -
mediatek mt6890 -
mediatek mt6891 -
mediatek mt6893 -
mediatek mt6895 -
mediatek mt6895tt -
mediatek mt6896 -
mediatek mt6897 -
mediatek mt6899 -
mediatek mt6980 -
mediatek mt6980d -
mediatek mt6983 -
mediatek mt6983t -
mediatek mt6985 -
mediatek mt6985t -
mediatek mt6989 -
mediatek mt6989t -
mediatek mt6990 -
mediatek mt6991 -
mediatek mt8666 -
mediatek mt8667 -
mediatek mt8675 -
mediatek mt8676 -
mediatek mt8765 -
mediatek mt8766 -
mediatek mt8768 -
mediatek mt8771 -
mediatek mt8781 -
mediatek mt8786 -
mediatek mt8788 -
mediatek mt8788e -
mediatek mt8789 -
mediatek mt8791 -
mediatek mt8791t -
mediatek mt8797 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12318A0A-16CD-48A5-98A4-373070734642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC63582A-F9A5-4450-A263-CE1FD4B4F3AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0002C537-4268-43CA-B349-BC14F1F0313C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE80B083-D5A3-418C-9655-C79C9DECB4C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3367BA13-9C4D-4CCF-8E71-397F33CFF773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B0EFB31-7B79-4529-A978-FA227D77F9F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD67454-1786-4BC7-B97E-96898F5FE3AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1BE913-70AE-49FE-99E9-E996165DF79D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14DD4149-ACBE-47B8-B52E-7CE8EECA3615",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FE7DBA-479C-402B-8485-9D14E70F25EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4D6885-E18C-477F-8B6D-B9E84D9535E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "483B6FB0-D683-4F3C-BA5B-6C9852179854",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2141B30A-C56F-4831-8FCD-4758DF97AD18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6309AE48-7266-435C-B906-50960F643FC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF887A-1862-4336-ABFC-371838E1D029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741."
    },
    {
      "lang": "es",
      "value": "En el Modem, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una gesti\u00f3n incorrecta de errores. Esto podr\u00eda provocar una divulgaci\u00f3n remota de informaci\u00f3n si un UE se conecta a una estaci\u00f3n base no autorizada controlada por el atacante, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: MOLY01513293; ID de problema: MSV-2741."
    }
  ],
  "id": "CVE-2025-20667",
  "lastModified": "2025-05-12T18:15:44.520",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-05T03:15:22.053",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-326"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-04 03:15
Modified
2025-04-22 20:36
Summary
In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541638; Issue ID: ALPS08541638.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4675A09-0147-4690-8AA1-E3802CA1B3EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541638; Issue ID: ALPS08541638."
    },
    {
      "lang": "es",
      "value": "En flashc, existe una posible escritura fuera de los l\u00edmites debido a la falta de valoraci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541638; ID del problema: ALPS08541638."
    }
  ],
  "id": "CVE-2024-20023",
  "lastModified": "2025-04-22T20:36:44.290",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-03-04T03:15:07.193",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130256; Issue ID: MOLY01130256 (MSV-848).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2EABFE5-4B6F-446C-9DE7-008D47C09ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130256; Issue ID: MOLY01130256 (MSV-848)."
    },
    {
      "lang": "es",
      "value": "En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio al recibir mensajes RRC con formato incorrecto, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01130256; ID del problema: MOLY01130256 (MSV-848)."
    }
  ],
  "id": "CVE-2023-32842",
  "lastModified": "2024-11-21T08:04:10.000",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:07.417",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-04 03:15
Modified
2025-04-22 20:36
Summary
In da, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355599; Issue ID: ALPS08355599.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF649E18-4DA8-4724-A9B2-575BC01BFACC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69D98D9F-4594-4411-B788-BBD53EE5B227",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In da, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355599; Issue ID: ALPS08355599."
    },
    {
      "lang": "es",
      "value": "En da, existe una posible omisi\u00f3n de permiso debido a que falta una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08355599; ID del problema: ALPS08355599."
    }
  ],
  "id": "CVE-2024-20005",
  "lastModified": "2025-04-22T20:36:03.550",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-03-04T03:15:06.917",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2025-05-29 14:15
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130204; Issue ID: MOLY01130204 (MSV-849).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2EABFE5-4B6F-446C-9DE7-008D47C09ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130204; Issue ID: MOLY01130204 (MSV-849)."
    },
    {
      "lang": "es",
      "value": "En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio al recibir mensajes RRC con formato incorrecto, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01130204; ID del problema: MOLY01130204 (MSV-849)."
    }
  ],
  "id": "CVE-2023-32843",
  "lastModified": "2025-05-29T14:15:30.727",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-12-04T04:15:07.463",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07509605.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07509605."
    }
  ],
  "id": "CVE-2023-20755",
  "lastModified": "2024-11-21T07:41:28.977",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-04T02:15:09.940",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-02 03:15
Modified
2024-11-21 08:04
Summary
In apusys, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07713478; Issue ID: ALPS07713478.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2EECB3C-723A-492D-A6D7-6A1A73EDBFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mediatek:iot_yocto:23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9ED712-53EF-4AF7-AB45-A87B50F6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8137:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3E832CB-1FEB-4E32-B675-6CC49E4A8024",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8139:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C5DB83-B705-4B2C-916E-4B67C0D9FBAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B3A37B9-F500-4B3C-B77C-B2BD7B015154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In apusys, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07713478; Issue ID: ALPS07713478."
    },
    {
      "lang": "es",
      "value": "En apusys, existe una posible escritura fuera de l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07713478; ID del problema: ALPS07713478."
    }
  ],
  "id": "CVE-2023-32829",
  "lastModified": "2024-11-21T08:04:07.997",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-10-02T03:15:10.183",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-04 03:15
Modified
2025-04-22 20:14
Summary
In aee, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08487630; Issue ID: MSV-1020.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08487630; Issue ID: MSV-1020."
    },
    {
      "lang": "es",
      "value": "En aee, existe una posible omisi\u00f3n de permiso debido a que falta una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08487630; ID del problema: MSV-1020."
    }
  ],
  "id": "CVE-2024-20032",
  "lastModified": "2025-04-22T20:14:41.540",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-03-04T03:15:07.587",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In meta, there is a possible classic buffer overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08000473; Issue ID: ALPS08000473.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4675A09-0147-4690-8AA1-E3802CA1B3EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In meta, there is a possible classic buffer overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08000473; Issue ID: ALPS08000473."
    },
    {
      "lang": "es",
      "value": "En meta, existe un posible desbordamiento del b\u00fafer cl\u00e1sico debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08000473; ID del problema: ALPS08000473."
    }
  ],
  "id": "CVE-2023-32859",
  "lastModified": "2024-11-21T08:04:12.143",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.240",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-05-05 03:15
Modified
2025-05-12 18:15
Summary
In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr17r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC63582A-F9A5-4450-A263-CE1FD4B4F3AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FE7DBA-479C-402B-8485-9D14E70F25EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6878m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "483B6FB0-D683-4F3C-BA5B-6C9852179854",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2141B30A-C56F-4831-8FCD-4758DF97AD18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6309AE48-7266-435C-B906-50960F643FC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF887A-1862-4336-ABFC-371838E1D029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772."
    },
    {
      "lang": "es",
      "value": "En Modem, existe una posible omisi\u00f3n de permisos debido a una validaci\u00f3n incorrecta del certificado. Esto podr\u00eda provocar la divulgaci\u00f3n remota de informaci\u00f3n si un UE se conecta a una estaci\u00f3n base no autorizada controlada por el atacante, con privilegios de ejecuci\u00f3n de usuario necesarios. La interacci\u00f3n del usuario es necesaria para su explotaci\u00f3n. ID de parche: MOLY01334347; ID de problema: MSV-2772."
    }
  ],
  "id": "CVE-2025-20670",
  "lastModified": "2025-05-12T18:15:44.703",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-05T03:15:22.300",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2024-10-27 03:35
Summary
In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944210; Issue ID: MSV-1561.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B405E0-E094-48F4-951B-96132898F72F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D36D1D8-C428-438F-A773-150B30A8EBFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:22.03.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A72088-37C7-4820-B650-440FE4848BDD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944210; Issue ID: MSV-1561."
    },
    {
      "lang": "es",
      "value": "En estado de encendido, es posible que se produzca una lectura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08944210; ID de problema: MSV-1561."
    }
  ],
  "id": "CVE-2024-20084",
  "lastModified": "2024-10-27T03:35:00.590",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-09-02T05:15:14.797",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS07905323.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyinstall, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS07905323."
    }
  ],
  "id": "CVE-2023-20781",
  "lastModified": "2024-11-21T07:41:30.893",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-07T04:15:12.647",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-04 04:15
Modified
2024-11-21 08:04
Summary
In display drm, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292187; Issue ID: ALPS07292187.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display drm, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292187; Issue ID: ALPS07292187."
    },
    {
      "lang": "es",
      "value": "En display drm, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07292187; ID del problema: ALPS07292187."
    }
  ],
  "id": "CVE-2023-32864",
  "lastModified": "2024-11-21T08:04:13.507",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-04T04:15:08.487",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-04-17 19:15
Summary
In display drm, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780685; Issue ID: ALPS07780685.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In display drm, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780685; Issue ID: ALPS07780685."
    },
    {
      "lang": "es",
      "value": "En display drm, existe una posible corrupci\u00f3n de la memoria debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07780685; ID del problema: ALPS07780685."
    }
  ],
  "id": "CVE-2023-32885",
  "lastModified": "2025-04-17T19:15:55.867",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:08.353",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 22:15
Summary
In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559819.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559819."
    }
  ],
  "id": "CVE-2023-20739",
  "lastModified": "2025-01-07T22:15:28.793",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-06-06T13:15:13.590",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08013530.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08013530."
    },
    {
      "lang": "es",
      "value": "En gps, existe una posible escritura fuera de los l\u00edmites debido a una falta de verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08014144; ID del problema: ALPS08013530."
    }
  ],
  "id": "CVE-2023-20832",
  "lastModified": "2024-11-21T07:41:38.733",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-09-04T03:15:09.873",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2025-06-03 15:15
Summary
In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08308607.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08308607."
    },
    {
      "lang": "es",
      "value": "En keyInstall, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08308607; ID del problema: ALPS08308607."
    }
  ],
  "id": "CVE-2023-32872",
  "lastModified": "2025-06-03T15:15:27.703",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-02T03:15:07.790",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

CVE-2024-20036 (GCVE-0-2024-20036)
Vulnerability from cvelistv5
Published
2024-03-04 02:43
Modified
2025-03-20 19:08
CWE
  • Information Disclosure
Summary
In vdec, there is a possible permission bypass due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08509508; Issue ID: ALPS08509508.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.630Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8792",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20036",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-26T20:55:14.066652Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-284",
                "description": "CWE-284 Improper Access Control",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-20T19:08:25.591Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6835, MT6855, MT6879, MT6886, MT6895, MT6983, MT6985, MT8792, MT8796, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In vdec, there is a possible permission bypass due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08509508; Issue ID: ALPS08509508."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-04T02:43:51.821Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20036",
    "datePublished": "2024-03-04T02:43:51.821Z",
    "dateReserved": "2023-11-02T13:35:35.153Z",
    "dateUpdated": "2025-03-20T19:08:25.591Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32814 (GCVE-0-2023-32814)
Vulnerability from cvelistv5
Published
2023-09-04 02:28
Modified
2024-10-08 20:11
Severity ?
CWE
  • Elevation of Privilege
Summary
In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08031947; Issue ID: ALPS08031947.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.092Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32814",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-08T14:00:20.400550Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-08T20:11:58.933Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2735, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6895, MT6980, MT6983, MT6985, MT6990, MT8168, MT8175, MT8188, MT8195, MT8365, MT8666, MT8667, MT8673",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08031947; Issue ID: ALPS08031947."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:28:23.879Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32814",
    "datePublished": "2023-09-04T02:28:23.879Z",
    "dateReserved": "2023-05-16T03:04:32.146Z",
    "dateUpdated": "2024-10-08T20:11:58.933Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20698 (GCVE-0-2025-20698)
Vulnerability from cvelistv5
Published
2025-08-04 01:49
Modified
2025-08-05 03:56
CWE
Summary
In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915400; Issue ID: MSV-3793.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20698",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-04T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-05T03:56:12.301Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8196, MT8391, MT8676, MT8678, MT8775, MT8786, MT8788E, MT8792, MT8796, MT8873, MT8883, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915400; Issue ID: MSV-3793."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-04T01:49:50.189Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20698",
    "datePublished": "2025-08-04T01:49:50.189Z",
    "dateReserved": "2024-11-01T01:21:50.382Z",
    "dateUpdated": "2025-08-05T03:56:12.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32871 (GCVE-0-2023-32871)
Vulnerability from cvelistv5
Published
2024-05-06 02:51
Modified
2025-03-17 17:02
CWE
  • CWE-391 - Unchecked Error Condition
Summary
In DA, there is a possible permission bypass due to an incorrect status check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355514; Issue ID: ALPS08355514.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8185",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8395",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8755",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8775",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2737",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8173",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_11.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "LOW",
              "baseScore": 5.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32871",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-07T04:00:28.814395Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-17T17:02:28.221Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.185Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8755, MT8765, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0, 14.0 / OpenWrt 19.07, 21.02 / Yocto 3.3, 4.0 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In DA, there is a possible permission bypass due to an incorrect status check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355514; Issue ID: ALPS08355514."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-391",
              "description": "CWE-391 Unchecked Error Condition",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-06T02:51:52.075Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32871",
    "datePublished": "2024-05-06T02:51:52.075Z",
    "dateReserved": "2023-05-16T03:04:32.164Z",
    "dateUpdated": "2025-03-17T17:02:28.221Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32840 (GCVE-0-2023-32840)
Vulnerability from cvelistv5
Published
2023-11-06 03:50
Modified
2024-09-05 15:06
CWE
  • Elevation of Privilege
Summary
In modem CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction may be also needed for exploitation Patch ID: MOLY01138425; Issue ID: MOLY01138425 (MSV-862).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:44.816Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2731",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2735",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6731",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6763",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6767",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769z",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6771t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6771t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6813",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833p",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980d",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983w:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983w",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983z:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983z",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8675",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 8.4,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32840",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-05T15:06:09.151529Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-05T15:06:29.403Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2731, MT2735, MT6731, MT6739, MT6761, MT6762, MT6763, MT6765, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6771T, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, NR15, NR16, VMOLYN, NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In modem CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction may be also needed for exploitation Patch ID: MOLY01138425; Issue ID: MOLY01138425 (MSV-862)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-06T03:50:57.414Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32840",
    "datePublished": "2023-11-06T03:50:57.414Z",
    "dateReserved": "2023-05-16T03:04:32.153Z",
    "dateUpdated": "2024-09-05T15:06:29.403Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32842 (GCVE-0-2023-32842)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-02 15:32
Severity ?
CWE
  • Denial of Service
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130256; Issue ID: MOLY01130256 (MSV-848).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:44.816Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, and NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130256; Issue ID: MOLY01130256 (MSV-848)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:00.658Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32842",
    "datePublished": "2023-12-04T03:46:00.658Z",
    "dateReserved": "2023-05-16T03:04:32.153Z",
    "dateUpdated": "2024-08-02T15:32:44.816Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20789 (GCVE-0-2023-20789)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:36
Severity ?
CWE
  • Information Disclosure
Summary
In jpeg, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07693193; Issue ID: ALPS07693193.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.023Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20789",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:36:13.302860Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:36:38.551Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6789, MT6835, MT6855, MT6879, MT6886, MT6895, MT6983, MT6985, MT8188, MT8195, MT8195Z",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In jpeg, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07693193; Issue ID: ALPS07693193."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:19.002Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20789",
    "datePublished": "2023-08-07T03:21:19.002Z",
    "dateReserved": "2022-10-28T02:03:10.778Z",
    "dateUpdated": "2024-10-17T14:36:38.551Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20742 (GCVE-0-2023-20742)
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-07 21:08
CWE
  • Information Disclosure
Summary
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628540.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.936Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20742",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-07T21:08:04.127345Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-07T21:08:15.849Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628540."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-06T12:11:35.201Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20742",
    "datePublished": "2023-06-06T12:11:35.201Z",
    "dateReserved": "2022-10-28T02:03:10.768Z",
    "dateUpdated": "2025-01-07T21:08:15.849Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20741 (GCVE-0-2023-20741)
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-07 20:14
CWE
  • Information Disclosure
Summary
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628606.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.939Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20741",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-07T20:14:16.559947Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-07T20:14:52.837Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628606."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-06T12:11:33.302Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20741",
    "datePublished": "2023-06-06T12:11:33.302Z",
    "dateReserved": "2022-10-28T02:03:10.768Z",
    "dateUpdated": "2025-01-07T20:14:52.837Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32886 (GCVE-0-2023-32886)
Vulnerability from cvelistv5
Published
2024-01-02 02:50
Modified
2025-06-03 14:46
CWE
  • Denial of Service
Summary
In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00730807; Issue ID: MOLY00730807.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.466Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32886",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-09T23:31:20.348713Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T14:46:37.758Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990, MT8673, MT8675, MT8676, MT8791, MT8791T, MT8792, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, and NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00730807; Issue ID: MOLY00730807."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:50:00.224Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32886",
    "datePublished": "2024-01-02T02:50:00.224Z",
    "dateReserved": "2023-05-16T03:04:32.173Z",
    "dateUpdated": "2025-06-03T14:46:37.758Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20133 (GCVE-0-2024-20133)
Vulnerability from cvelistv5
Published
2024-12-02 03:07
Modified
2024-12-03 04:55
CWE
Summary
In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1871.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8795t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20133",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-02T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-03T04:55:30.550Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6879, MT6886, MT6895, MT6895T, MT6896, MT6980, MT6983, MT8673, MT8676, MT8795T, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR16"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1871."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-02T03:07:05.067Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20133",
    "datePublished": "2024-12-02T03:07:05.067Z",
    "dateReserved": "2023-11-02T13:35:35.181Z",
    "dateUpdated": "2024-12-03T04:55:30.550Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32860 (GCVE-0-2023-32860)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-02 15:32
Severity ?
CWE
  • Elevation of Privilege
Summary
In display, there is a possible classic buffer overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929788; Issue ID: ALPS07929788.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.607Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display, there is a possible classic buffer overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929788; Issue ID: ALPS07929788."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:09.320Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32860",
    "datePublished": "2023-12-04T03:46:09.320Z",
    "dateReserved": "2023-05-16T03:04:32.160Z",
    "dateUpdated": "2024-08-02T15:32:46.607Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20795 (GCVE-0-2023-20795)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-22 19:14
CWE
  • Elevation of Privilege
Summary
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07864900; Issue ID: ALPS07864900.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.989Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20795",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T19:14:05.894936Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T19:14:46.616Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6761, MT6762, MT6768, MT6769, MT6779, MT6781, MT6785, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07864900; Issue ID: ALPS07864900."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:27.667Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20795",
    "datePublished": "2023-08-07T03:21:27.667Z",
    "dateReserved": "2022-10-28T02:03:10.781Z",
    "dateUpdated": "2024-10-22T19:14:46.616Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20667 (GCVE-0-2025-20667)
Vulnerability from cvelistv5
Published
2025-05-05 02:49
Modified
2025-05-12 17:50
CWE
  • CWE-326 - Inadequate Encryption Strength
Summary
In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20667",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-12T17:50:38.812599Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-12T17:50:53.123Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8675, MT8676, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, LR13, NR15, NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-326",
              "description": "CWE-326 Inadequate Encryption Strength",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-05T02:49:11.742Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20667",
    "datePublished": "2025-05-05T02:49:11.742Z",
    "dateReserved": "2024-11-01T01:21:50.368Z",
    "dateUpdated": "2025-05-12T17:50:53.123Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20108 (GCVE-0-2024-20108)
Vulnerability from cvelistv5
Published
2024-11-04 01:48
Modified
2024-11-04 10:55
CWE
Summary
In atci, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09082988; Issue ID: MSV-1774.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8173",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8185",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8370",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8395",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8675",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8755",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8775",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8792",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8795t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              },
              {
                "status": "affected",
                "version": "14.0"
              },
              {
                "status": "affected",
                "version": "15.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20108",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-04T10:54:11.180033Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-04T10:55:01.488Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8370, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8755, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8792, MT8795T, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In atci, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09082988; Issue ID: MSV-1774."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T01:48:43.978Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20108",
    "datePublished": "2024-11-04T01:48:43.978Z",
    "dateReserved": "2023-11-02T13:35:35.177Z",
    "dateUpdated": "2024-11-04T10:55:01.488Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32876 (GCVE-0-2023-32876)
Vulnerability from cvelistv5
Published
2024-01-02 02:49
Modified
2025-06-03 14:46
CWE
  • Information Disclosure
Summary
In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308612; Issue ID: ALPS08308612.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:45.316Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32876",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-08T20:16:18.526727Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T14:46:52.834Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308612; Issue ID: ALPS08308612."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:49:41.753Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32876",
    "datePublished": "2024-01-02T02:49:41.753Z",
    "dateReserved": "2023-05-16T03:04:32.171Z",
    "dateUpdated": "2025-06-03T14:46:52.834Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20711 (GCVE-0-2023-20711)
Vulnerability from cvelistv5
Published
2023-05-15 00:00
Modified
2025-01-24 19:10
CWE
  • Information Disclosure
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581668; Issue ID: ALPS07581668.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.938Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20711",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-24T19:09:56.430594Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-24T19:10:00.382Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581668; Issue ID: ALPS07581668."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-15T00:00:00.000Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20711",
    "datePublished": "2023-05-15T00:00:00.000Z",
    "dateReserved": "2022-10-28T00:00:00.000Z",
    "dateUpdated": "2025-01-24T19:10:00.382Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20784 (GCVE-0-2023-20784)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-11-14 14:59
Severity ?
CWE
  • Elevation of Privilege
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826989; Issue ID: ALPS07826989.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.968Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20784",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-14T14:59:09.375025Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-14T14:59:34.763Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826989; Issue ID: ALPS07826989."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:08.559Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20784",
    "datePublished": "2023-08-07T03:21:08.559Z",
    "dateReserved": "2022-10-28T02:03:10.777Z",
    "dateUpdated": "2024-11-14T14:59:34.763Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32822 (GCVE-0-2023-32822)
Vulnerability from cvelistv5
Published
2023-10-02 02:05
Modified
2024-09-23 15:23
CWE
  • Elevation of Privilege
Summary
In ftm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07994229; Issue ID: ALPS07994229.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.057Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2713",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32822",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-23T15:21:42.816055Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-23T15:23:49.381Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6833, MT6835, MT6855, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6985, MT8167, MT8167S, MT8168, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ftm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07994229; Issue ID: ALPS07994229."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-02T02:05:31.556Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32822",
    "datePublished": "2023-10-02T02:05:31.556Z",
    "dateReserved": "2023-05-16T03:04:32.148Z",
    "dateUpdated": "2024-09-23T15:23:49.381Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20130 (GCVE-0-2024-20130)
Vulnerability from cvelistv5
Published
2024-12-02 03:07
Modified
2024-12-03 04:55
CWE
Summary
In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09193374; Issue ID: MSV-1982.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8696",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20130",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-02T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-03T04:55:26.732Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8195, MT8676, MT8678, MT8696, MT8796",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09193374; Issue ID: MSV-1982."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121 Stack Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-02T03:07:00.229Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20130",
    "datePublished": "2024-12-02T03:07:00.229Z",
    "dateReserved": "2023-11-02T13:35:35.180Z",
    "dateUpdated": "2024-12-03T04:55:26.732Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32825 (GCVE-0-2023-32825)
Vulnerability from cvelistv5
Published
2023-11-06 03:50
Modified
2024-09-05 15:08
Severity ?
CWE
  • Information Disclosure
Summary
In bluethooth service, there is a possible out of bounds reads due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07884130; Issue ID: ALPS07884130.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.016Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32825",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-05T15:07:57.656951Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-05T15:08:03.908Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6580, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT7921, MT8168, MT8175, MT8188, MT8195, MT8321, MT8365, MT8390, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In bluethooth service, there is a possible out of bounds reads due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07884130; Issue ID: ALPS07884130."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-06T03:50:56.000Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32825",
    "datePublished": "2023-11-06T03:50:56.000Z",
    "dateReserved": "2023-05-16T03:04:32.149Z",
    "dateUpdated": "2024-09-05T15:08:03.908Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20831 (GCVE-0-2023-20831)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-10 15:22
CWE
  • Elevation of Privilege
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014162.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.994Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2735",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20831",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T15:21:56.960191Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-10T15:22:06.368Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8175, MT8195, MT8362A, MT8365",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014162."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:34.059Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20831",
    "datePublished": "2023-09-04T02:27:34.059Z",
    "dateReserved": "2022-10-28T02:03:23.685Z",
    "dateUpdated": "2024-10-10T15:22:06.368Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20023 (GCVE-0-2024-20023)
Vulnerability from cvelistv5
Published
2024-03-04 02:43
Modified
2024-08-25 15:17
CWE
  • Elevation of Privilege
Summary
In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541638; Issue ID: ALPS08541638.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.735Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2713",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2737",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8370",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              },
              {
                "status": "affected",
                "version": "14.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:openwrt:openwrt:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "openwrt",
            "vendor": "openwrt",
            "versions": [
              {
                "status": "affected",
                "version": "19.07"
              },
              {
                "status": "affected",
                "version": "21.02"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20023",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-08T05:00:26.777091Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-25T15:17:44.836Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2737, MT6781, MT6789, MT6835, MT6855, MT6879, MT6880, MT6886, MT6890, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8188, MT8188T, MT8370, MT8390, MT8673, MT8676, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0 / OpenWrt 19.07, 21.02 / Yocto 3.3 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541638; Issue ID: ALPS08541638."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-04T02:43:32.414Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20023",
    "datePublished": "2024-03-04T02:43:32.414Z",
    "dateReserved": "2023-11-02T13:35:35.151Z",
    "dateUpdated": "2024-08-25T15:17:44.836Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32809 (GCVE-0-2023-32809)
Vulnerability from cvelistv5
Published
2023-09-04 02:28
Modified
2024-08-02 15:25
Severity ?
CWE
  • Elevation of Privilege
Summary
In bluetooth driver, there is a possible read and write access to registers due to improper access control of register interface. This could lead to local leak of sensitive information with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07849753; Issue ID: ALPS07849753.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.098Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT8168, MT8175, MT8188, MT8195, MT8365, MT8666, MT8667, MT8673, MT8781, MT8781WIFI, MT8791, MT8791T, MT8791WIFI, MT8797, MT8797WIFI",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In bluetooth driver, there is a possible read and write access to registers due to improper access control of register interface. This could lead to local leak of sensitive information with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07849753; Issue ID: ALPS07849753."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:28:15.636Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32809",
    "datePublished": "2023-09-04T02:28:15.636Z",
    "dateReserved": "2023-05-16T03:04:32.145Z",
    "dateUpdated": "2024-08-02T15:25:37.098Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20748 (GCVE-0-2023-20748)
Vulnerability from cvelistv5
Published
2023-07-04 01:45
Modified
2024-11-21 15:28
Severity ?
CWE
  • Information Disclosure
Summary
In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07536951; Issue ID: ALPS07536951.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.044Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20748",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T15:27:51.304390Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T15:28:07.363Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6879, MT6886, MT6895, MT6983, MT6985, MT8673, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07536951; Issue ID: ALPS07536951."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:45:01.488Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20748",
    "datePublished": "2023-07-04T01:45:01.488Z",
    "dateReserved": "2022-10-28T02:03:10.770Z",
    "dateUpdated": "2024-11-21T15:28:07.363Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20826 (GCVE-0-2023-20826)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-28 01:34
CWE
  • Information Disclosure
Summary
In cta, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07978550; Issue ID: ALPS07978550.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.203Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20826",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T16:54:20.332097Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-862",
                "description": "CWE-862 Missing Authorization",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-28T01:34:15.973Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6761, MT6765, MT6779, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6895, MT6983, MT6985, MT8168, MT8175, MT8188, MT8195, MT8365, MT8673",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In cta, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07978550; Issue ID: ALPS07978550."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:25.656Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20826",
    "datePublished": "2023-09-04T02:27:25.656Z",
    "dateReserved": "2022-10-28T02:03:23.683Z",
    "dateUpdated": "2024-10-28T01:34:15.973Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32808 (GCVE-0-2023-32808)
Vulnerability from cvelistv5
Published
2023-09-04 02:28
Modified
2024-08-02 15:25
Severity ?
CWE
  • Elevation of Privilege
Summary
In bluetooth driver, there is a possible read and write access to registers due to improper access control of register interface. This could lead to local leak of sensitive information with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07849751; Issue ID: ALPS07849751.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.140Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT8168, MT8175, MT8188, MT8195, MT8365, MT8666, MT8667, MT8673, MT8781, MT8781WIFI, MT8791, MT8791T, MT8791WIFI, MT8797, MT8797WIFI",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In bluetooth driver, there is a possible read and write access to registers due to improper access control of register interface. This could lead to local leak of sensitive information with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07849751; Issue ID: ALPS07849751."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:28:14.025Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32808",
    "datePublished": "2023-09-04T02:28:14.025Z",
    "dateReserved": "2023-05-16T03:04:32.145Z",
    "dateUpdated": "2024-08-02T15:25:37.140Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32872 (GCVE-0-2023-32872)
Vulnerability from cvelistv5
Published
2024-01-02 02:49
Modified
2025-06-03 14:46
CWE
  • Elevation of Privilege
Summary
In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08308607.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.517Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32872",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-08T17:31:19.727059Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T14:46:58.046Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08308607."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:49:36.395Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32872",
    "datePublished": "2024-01-02T02:49:36.395Z",
    "dateReserved": "2023-05-16T03:04:32.164Z",
    "dateUpdated": "2025-06-03T14:46:58.046Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32863 (GCVE-0-2023-32863)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2025-05-29 13:56
CWE
  • Elevation of Privilege
Summary
In display drm, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326314; Issue ID: ALPS07326314.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.494Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32863",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-29T13:55:30.362417Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-29T13:56:34.409Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display drm, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326314; Issue ID: ALPS07326314."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:13.895Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32863",
    "datePublished": "2023-12-04T03:46:13.895Z",
    "dateReserved": "2023-05-16T03:04:32.161Z",
    "dateUpdated": "2025-05-29T13:56:34.409Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32887 (GCVE-0-2023-32887)
Vulnerability from cvelistv5
Published
2024-01-02 02:50
Modified
2025-06-16 19:47
CWE
  • Denial of Service
Summary
In Modem IMS Stack, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161837; Issue ID: MOLY01161837 (MSV-892).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.752Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32887",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-16T19:46:54.281143Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-119",
                "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
                "lang": "en",
                "type": "CWE"
              }
            ]
          },
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-16T19:47:35.356Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, and NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem IMS Stack, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161837; Issue ID: MOLY01161837 (MSV-892)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:50:02.182Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32887",
    "datePublished": "2024-01-02T02:50:02.182Z",
    "dateReserved": "2023-05-16T03:04:32.174Z",
    "dateUpdated": "2025-06-16T19:47:35.356Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32820 (GCVE-0-2023-32820)
Vulnerability from cvelistv5
Published
2023-10-02 02:05
Modified
2024-09-23 15:27
CWE
  • Denial of Service
Summary
In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.050Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt5221",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7663",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7668",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7902",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7921",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8518s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8532",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8675",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8695",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "11.0"
              },
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32820",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-23T15:26:22.197010Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-23T15:27:56.957Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT5221, MT6781, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT7663, MT7668, MT7902, MT7921, MT8168, MT8365, MT8518S, MT8532, MT8666, MT8673, MT8675, MT8695, MT8766, MT8768, MT8781, MT8786, MT8789, MT8791, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0 / Linux 4.19 / Yocto 3.1, 3.3 / IOT-v23.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-02T02:05:28.312Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32820",
    "datePublished": "2023-10-02T02:05:28.312Z",
    "dateReserved": "2023-05-16T03:04:32.147Z",
    "dateUpdated": "2024-09-23T15:27:56.957Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20145 (GCVE-0-2024-20145)
Vulnerability from cvelistv5
Published
2025-01-06 03:17
Modified
2025-01-06 14:18
CWE
Summary
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09290940; Issue ID: MSV-2040.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.6,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20145",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T14:17:56.953512Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-06T14:18:04.465Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8676",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 14.0, 15.0 / openWRT 19.07, 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09290940; Issue ID: MSV-2040."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T03:17:48.166Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20145",
    "datePublished": "2025-01-06T03:17:48.166Z",
    "dateReserved": "2023-11-02T13:35:35.185Z",
    "dateUpdated": "2025-01-06T14:18:04.465Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20786 (GCVE-0-2023-20786)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-12-04 15:14
Severity ?
CWE
  • Elevation of Privilege
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767811; Issue ID: ALPS07767811.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.941Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20786",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T15:13:52.652027Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T15:14:25.900Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8175, MT8188, MT8195, MT8362A, MT8365, MT8673",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767811; Issue ID: ALPS07767811."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:12.540Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20786",
    "datePublished": "2023-08-07T03:21:12.540Z",
    "dateReserved": "2022-10-28T02:03:10.777Z",
    "dateUpdated": "2024-12-04T15:14:25.900Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20653 (GCVE-0-2025-20653)
Vulnerability from cvelistv5
Published
2025-03-03 02:25
Modified
2025-03-20 18:53
CWE
Summary
In da, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291064; Issue ID: MSV-2046.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20653",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-14T19:27:33.867796Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-20T18:53:09.070Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6886, MT6895, MT6897, MT6983, MT6985, MT6989, MT8370, MT8390",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In da, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291064; Issue ID: MSV-2046."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-190",
              "description": "CWE-190 Integer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-03T02:25:50.462Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20653",
    "datePublished": "2025-03-03T02:25:50.462Z",
    "dateReserved": "2024-11-01T01:21:50.366Z",
    "dateUpdated": "2025-03-20T18:53:09.070Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32853 (GCVE-0-2023-32853)
Vulnerability from cvelistv5
Published
2023-12-04 03:45
Modified
2024-08-02 15:32
Severity ?
CWE
  • Elevation of Privilege
Summary
In rpmb, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07648764; Issue ID: ALPS07648764.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:45.837Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8168, MT8321, MT8365",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In rpmb, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07648764; Issue ID: ALPS07648764."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:45:50.631Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32853",
    "datePublished": "2023-12-04T03:45:50.631Z",
    "dateReserved": "2023-05-16T03:04:32.157Z",
    "dateUpdated": "2024-08-02T15:32:45.837Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32859 (GCVE-0-2023-32859)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-10-17 15:20
CWE
  • Elevation of Privilege
Summary
In meta, there is a possible classic buffer overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08000473; Issue ID: ALPS08000473.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.661Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6893:*:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8675:*:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Android 12.0"
              },
              {
                "status": "affected",
                "version": "Android 13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32859",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T17:15:02.983895Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-120",
                "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T15:20:45.998Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8188T, MT8195, MT8321, MT8362A, MT8365, MT8390, MT8395, MT8666, MT8675, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In meta, there is a possible classic buffer overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08000473; Issue ID: ALPS08000473."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:07.877Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32859",
    "datePublished": "2023-12-04T03:46:07.877Z",
    "dateReserved": "2023-05-16T03:04:32.160Z",
    "dateUpdated": "2024-10-17T15:20:45.998Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20681 (GCVE-0-2023-20681)
Vulnerability from cvelistv5
Published
2023-04-06 00:00
Modified
2025-02-12 15:45
CWE
  • Elevation of Privilege
Summary
In adsp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07696134; Issue ID: ALPS07696134.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.574Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20681",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-12T15:43:35.650431Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-12T15:45:02.282Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6886, MT6895, MT6983, MT6985, MT8365, MT8771, MT8781, MT8781WIFI, MT8791, MT8791T, MT8791WIFI, MT8795T, MT8797, MT8797WIFI, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In adsp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07696134; Issue ID: ALPS07696134."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-06T00:00:00.000Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20681",
    "datePublished": "2023-04-06T00:00:00.000Z",
    "dateReserved": "2022-10-28T00:00:00.000Z",
    "dateUpdated": "2025-02-12T15:45:02.282Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20817 (GCVE-0-2023-20817)
Vulnerability from cvelistv5
Published
2023-08-07 03:22
Modified
2024-10-16 20:17
CWE
  • Elevation of Privilege
Summary
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453600; Issue ID: ALPS07453600.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.061Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20817",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-16T20:13:08.445393Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-16T20:17:14.030Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453600; Issue ID: ALPS07453600."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:22:14.021Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20817",
    "datePublished": "2023-08-07T03:22:14.021Z",
    "dateReserved": "2022-10-28T02:03:23.673Z",
    "dateUpdated": "2024-10-16T20:17:14.030Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20732 (GCVE-0-2023-20732)
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-08 14:57
CWE
  • Information Disclosure
Summary
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573480; Issue ID: ALPS07573480.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.943Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20732",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-08T14:57:11.638473Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-08T14:57:15.575Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT7663, MT7668, MT7902, MT7921, MT8167, MT8167S, MT8173, MT8175, MT8195, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8666, MT8695, MT8781, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / Yocto 3.1,3.3,4.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573480; Issue ID: ALPS07573480."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-06T12:11:15.218Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20732",
    "datePublished": "2023-06-06T12:11:15.218Z",
    "dateReserved": "2022-10-28T02:03:10.767Z",
    "dateUpdated": "2025-01-08T14:57:15.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20634 (GCVE-0-2025-20634)
Vulnerability from cvelistv5
Published
2025-02-03 03:23
Modified
2025-03-18 13:36
Severity ?
CWE
Summary
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01289384; Issue ID: MSV-2436.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20634",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-03T16:24:52.606649Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-18T13:36:09.562Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8676, MT8678, MT8795T, MT8798, MT8863",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01289384; Issue ID: MSV-2436."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-03T03:23:49.665Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20634",
    "datePublished": "2025-02-03T03:23:49.665Z",
    "dateReserved": "2024-11-01T01:21:50.362Z",
    "dateUpdated": "2025-03-18T13:36:09.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32826 (GCVE-0-2023-32826)
Vulnerability from cvelistv5
Published
2023-10-02 02:05
Modified
2024-09-21 15:26
CWE
  • Elevation of Privilege
Summary
In camera middleware, there is a possible out of bounds write due to a missing input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993539; Issue ID: ALPS07993544.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.069Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8173",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8185",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8395",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8675",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32826",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-21T15:23:55.667162Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          },
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-21T15:26:13.167Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6879, MT6886, MT6895, MT6983, MT6985, MT6989, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In camera middleware, there is a possible out of bounds write due to a missing input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993539; Issue ID: ALPS07993544."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-02T02:05:36.578Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32826",
    "datePublished": "2023-10-02T02:05:36.578Z",
    "dateReserved": "2023-05-16T03:04:32.149Z",
    "dateUpdated": "2024-09-21T15:26:13.167Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20797 (GCVE-0-2023-20797)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-22 17:12
CWE
  • Elevation of Privilege
Summary
In camera middleware, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629582; Issue ID: ALPS07629582.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.993Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20797",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T17:12:11.646397Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T17:12:19.616Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6879, MT6886, MT6895, MT6983, MT6985, MT8188, MT8195, MT8673",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In camera middleware, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629582; Issue ID: ALPS07629582."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:31.898Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20797",
    "datePublished": "2023-08-07T03:21:31.898Z",
    "dateReserved": "2022-10-28T02:03:10.781Z",
    "dateUpdated": "2024-10-22T17:12:19.616Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32816 (GCVE-0-2023-32816)
Vulnerability from cvelistv5
Published
2023-09-04 02:28
Modified
2024-10-08 20:11
Severity ?
CWE
  • Elevation of Privilege
Summary
In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: ALPS08044032.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.015Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32816",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-08T14:00:16.349452Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-08T20:11:44.346Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6895, MT6983, MT6985, MT8168, MT8175, MT8188, MT8195, MT8365, MT8666, MT8667, MT8673",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: ALPS08044032."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:28:27.217Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32816",
    "datePublished": "2023-09-04T02:28:27.217Z",
    "dateReserved": "2023-05-16T03:04:32.147Z",
    "dateUpdated": "2024-10-08T20:11:44.346Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32867 (GCVE-0-2023-32867)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-02 15:32
Severity ?
CWE
  • Elevation of Privilege
Summary
In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560793; Issue ID: ALPS07560793.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.473Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8188, MT8195, MT8673, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560793; Issue ID: ALPS07560793."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:19.835Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32867",
    "datePublished": "2023-12-04T03:46:19.835Z",
    "dateReserved": "2023-05-16T03:04:32.162Z",
    "dateUpdated": "2024-08-02T15:32:46.473Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32813 (GCVE-0-2023-32813)
Vulnerability from cvelistv5
Published
2023-09-04 02:28
Modified
2024-10-08 20:12
Severity ?
CWE
  • Elevation of Privilege
Summary
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017370; Issue ID: ALPS08017370.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.090Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32813",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-08T14:00:21.839774Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-08T20:12:06.387Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2735, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6895, MT6980, MT6983, MT6985, MT6990, MT8168, MT8175, MT8188, MT8195, MT8365, MT8666, MT8667, MT8673",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017370; Issue ID: ALPS08017370."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:28:22.213Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32813",
    "datePublished": "2023-09-04T02:28:22.213Z",
    "dateReserved": "2023-05-16T03:04:32.146Z",
    "dateUpdated": "2024-10-08T20:12:06.387Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20651 (GCVE-0-2025-20651)
Vulnerability from cvelistv5
Published
2025-03-03 02:25
Modified
2025-03-03 19:01
CWE
Summary
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2062.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "LOW",
              "baseScore": 4.1,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20651",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-03T16:36:11.901504Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-03T19:01:46.250Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0 / openWRT 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2062."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-03T02:25:47.228Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20651",
    "datePublished": "2025-03-03T02:25:47.228Z",
    "dateReserved": "2024-11-01T01:21:50.366Z",
    "dateUpdated": "2025-03-03T19:01:46.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20656 (GCVE-0-2025-20656)
Vulnerability from cvelistv5
Published
2025-04-07 03:14
Modified
2025-04-07 13:57
CWE
Summary
In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09625423; Issue ID: MSV-3033.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.8,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20656",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T13:57:10.925878Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T13:57:13.648Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6886, MT6895, MT6897, MT6983, MT6985, MT6989, MT6990, MT8196, MT8370, MT8390",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0 / openWRT 21.02, 23.05 / Yocto 4.0 / RDK-B 24Q1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09625423; Issue ID: MSV-3033."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-07T03:14:49.018Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20656",
    "datePublished": "2025-04-07T03:14:49.018Z",
    "dateReserved": "2024-11-01T01:21:50.367Z",
    "dateUpdated": "2025-04-07T13:57:13.648Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20009 (GCVE-0-2024-20009)
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2025-06-20 20:07
CWE
  • Elevation of Privilege
Summary
In alac decoder, there is a possible out of bounds write due to an incorrect error handling. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08441150; Issue ID: ALPS08441150.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.568Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20009",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-13T05:00:38.576728Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-20T20:07:49.293Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6779, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6895, MT6983, MT6985, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8185, MT8188, MT8188T",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In alac decoder, there is a possible out of bounds write due to an incorrect error handling. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08441150; Issue ID: ALPS08441150."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-05T05:59:29.526Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20009",
    "datePublished": "2024-02-05T05:59:29.526Z",
    "dateReserved": "2023-11-02T13:35:35.147Z",
    "dateUpdated": "2025-06-20T20:07:49.293Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20129 (GCVE-0-2024-20129)
Vulnerability from cvelistv5
Published
2024-12-02 03:06
Modified
2025-03-13 17:37
CWE
Summary
In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2025.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766r:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766r",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788e",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8863t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8863t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20129",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-02T16:08:14.669561Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-13T17:37:46.948Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8321, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8797, MT8798, MT8863T",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2025."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-02T03:06:55.338Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20129",
    "datePublished": "2024-12-02T03:06:55.338Z",
    "dateReserved": "2023-11-02T13:35:35.180Z",
    "dateUpdated": "2025-03-13T17:37:46.948Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20005 (GCVE-0-2024-20005)
Vulnerability from cvelistv5
Published
2024-03-04 02:43
Modified
2024-08-06 15:01
CWE
  • Elevation of Privilege
Summary
In da, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355599; Issue ID: ALPS08355599.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.589Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8666b:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              },
              {
                "status": "affected",
                "version": "14.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 8.2,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "CHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20005",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-08T05:00:24.891185Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-276",
                "description": "CWE-276 Incorrect Default Permissions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:01:36.270Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8666, MT8666A, MT8666B, MT8667, MT8673, MT8675, MT8676, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In da, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355599; Issue ID: ALPS08355599."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-04T02:43:29.245Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20005",
    "datePublished": "2024-03-04T02:43:29.245Z",
    "dateReserved": "2023-11-02T13:35:35.147Z",
    "dateUpdated": "2024-08-06T15:01:36.270Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20033 (GCVE-0-2024-20033)
Vulnerability from cvelistv5
Published
2024-03-04 02:43
Modified
2024-11-01 15:24
CWE
  • Information Disclosure
Summary
In nvram, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08499945; Issue ID: ALPS08499945.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20033",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-06T15:50:14.898059Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-01T15:24:40.621Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.482Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6785, MT6789, MT6835, MT6855, MT6879, MT6883, MT6885, MT6886, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8370, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8755, MT8765, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791, MT8792, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In nvram, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08499945; Issue ID: ALPS08499945."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-04T02:43:48.493Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20033",
    "datePublished": "2024-03-04T02:43:48.493Z",
    "dateReserved": "2023-11-02T13:35:35.152Z",
    "dateUpdated": "2024-11-01T15:24:40.621Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20056 (GCVE-0-2024-20056)
Vulnerability from cvelistv5
Published
2024-05-06 02:51
Modified
2025-03-13 17:25
CWE
  • CWE-20 - Improper Input Validation
Summary
In preloader, there is a possible escalation of privilege due to an insecure default value. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528185; Issue ID: ALPS08528185.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20056",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-07T04:00:26.721529Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-13T17:25:42.524Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.743Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6761, MT6765, MT6768, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6880, MT6885, MT6886, MT6890, MT6893, MT6895, MT6897, MT6983, MT6985, MT6989, MT8666, MT8667, MT8673, MT8676, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0 / OpenWRT 19.07, 21.02, 23.05 / RDK-B 2022q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In preloader, there is a possible escalation of privilege due to an insecure default value. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528185; Issue ID: ALPS08528185."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-06T02:51:47.286Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20056",
    "datePublished": "2024-05-06T02:51:47.286Z",
    "dateReserved": "2023-11-02T13:35:35.161Z",
    "dateUpdated": "2025-03-13T17:25:42.524Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20125 (GCVE-0-2024-20125)
Vulnerability from cvelistv5
Published
2024-12-02 03:06
Modified
2024-12-03 04:55
CWE
Summary
In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained System privileges. User interaction is not needed for exploitation. Patch ID: ALPS09046782; Issue ID: MSV-1728.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8370",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8395",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20125",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-02T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-03T04:55:25.355Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8175, MT8195, MT8321, MT8365, MT8370, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained System privileges. User interaction is not needed for exploitation. Patch ID: ALPS09046782; Issue ID: MSV-1728."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-03T02:17:03.313Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20125",
    "datePublished": "2024-12-02T03:06:53.482Z",
    "dateReserved": "2023-11-02T13:35:35.180Z",
    "dateUpdated": "2024-12-03T04:55:25.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20041 (GCVE-0-2024-20041)
Vulnerability from cvelistv5
Published
2024-04-01 02:34
Modified
2024-08-01 21:52
CWE
  • Information Disclosure
Summary
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541746; Issue ID: ALPS08541746.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2713",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20041",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-21T19:47:18.258651Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:10.410Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.785Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6781, MT6789, MT6835, MT6855, MT6879, MT6886, MT6895, MT6983, MT6985, MT6989, MT8188, MT8673, MT8676, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541746; Issue ID: ALPS08541746."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-01T02:34:57.329Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20041",
    "datePublished": "2024-04-01T02:34:57.329Z",
    "dateReserved": "2023-11-02T13:35:35.155Z",
    "dateUpdated": "2024-08-01T21:52:31.785Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20832 (GCVE-0-2023-20832)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-04 14:22
CWE
  • Elevation of Privilege
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08013530.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.107Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2735",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20832",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-04T14:22:31.805059Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-04T14:22:36.874Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8168, MT8175, MT8195, MT8362A, MT8365",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08013530."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:35.686Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20832",
    "datePublished": "2023-09-04T02:27:35.686Z",
    "dateReserved": "2022-10-28T02:03:23.685Z",
    "dateUpdated": "2024-10-04T14:22:36.874Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20120 (GCVE-0-2024-20120)
Vulnerability from cvelistv5
Published
2024-11-04 01:49
Modified
2024-11-04 10:20
CWE
Summary
In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1575.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8755",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8775",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8792",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8795t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              },
              {
                "status": "affected",
                "version": "14.0"
              },
              {
                "status": "affected",
                "version": "15.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20120",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-04T10:20:17.850148Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-04T10:20:24.101Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6765, MT6768, MT6833, MT6835, MT6853, MT6855, MT6879, MT6886, MT6893, MT6983, MT8321, MT8385, MT8755, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8792, MT8795T, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1575."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T01:49:34.400Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20120",
    "datePublished": "2024-11-04T01:49:34.400Z",
    "dateReserved": "2023-11-02T13:35:35.179Z",
    "dateUpdated": "2024-11-04T10:20:24.101Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20796 (GCVE-0-2023-20796)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:33
Severity ?
CWE
  • Denial of Service
Summary
In power, there is a possible memory corruption due to an incorrect bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929790; Issue ID: ALPS07929790.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.983Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20796",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:32:20.334039Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:33:14.157Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6880, MT6886, MT6890, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8168, MT8321, MT8768, MT8781, MT8786",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 19.07, 21.02 / RDK-B 22Q3 / Yocto 2.6, 3.3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In power, there is a possible memory corruption due to an incorrect bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929790; Issue ID: ALPS07929790."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:29.719Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20796",
    "datePublished": "2023-08-07T03:21:29.719Z",
    "dateReserved": "2022-10-28T02:03:10.781Z",
    "dateUpdated": "2024-10-17T14:33:14.157Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20082 (GCVE-0-2024-20082)
Vulnerability from cvelistv5
Published
2024-08-14 03:02
Modified
2024-08-14 14:55
Severity ?
CWE
  • CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
In Modem, there is a possible memory corruption due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01182594; Issue ID: MSV-1529.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2735",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2737",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980d",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20082",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T14:42:58.390393Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T14:55:16.787Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6833, MT6835, MT6835T, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible memory corruption due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01182594; Issue ID: MSV-1529."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-14T03:02:49.053Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20082",
    "datePublished": "2024-08-14T03:02:49.053Z",
    "dateReserved": "2023-11-02T13:35:35.173Z",
    "dateUpdated": "2024-08-14T14:55:16.787Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32890 (GCVE-0-2023-32890)
Vulnerability from cvelistv5
Published
2024-01-02 02:50
Modified
2024-08-02 15:32
CWE
  • Denial of Service
Summary
In modem EMM, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01183647; Issue ID: MOLY01183647 (MSV-963).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2731",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6767",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769t",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769z",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Modem LR12A"
              },
              {
                "status": "affected",
                "version": "LR13"
              },
              {
                "status": "affected",
                "version": "NR15"
              },
              {
                "status": "affected",
                "version": "NR16"
              },
              {
                "status": "affected",
                "version": "NR17"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 5.9,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32890",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-04T20:40:04.105133Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:26:22.288Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.533Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2731, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT8666, MT8667, MT8765, MT8766, MT8768, MT8786, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In modem EMM, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01183647; Issue ID: MOLY01183647 (MSV-963)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-01T02:34:52.152Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32890",
    "datePublished": "2024-01-02T02:50:07.545Z",
    "dateReserved": "2023-05-16T03:04:32.174Z",
    "dateUpdated": "2024-08-02T15:32:46.533Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20693 (GCVE-0-2025-20693)
Vulnerability from cvelistv5
Published
2025-07-08 02:00
Modified
2025-07-08 14:14
CWE
Summary
In wlan STA driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09812521; Issue ID: MSV-3421.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20693",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-08T14:14:02.406464Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-08T14:14:59.180Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6985, MT6989, MT6990, MT6991, MT7902, MT7920, MT7921, MT7922, MT7923, MT7925, MT7927, MT7932, MT8196, MT8678, MT8796, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0 / SDK release 3.7 and before / openWRT 21.02, 23.05 / Yocto 4.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan STA driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09812521; Issue ID: MSV-3421."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-08T02:00:38.512Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20693",
    "datePublished": "2025-07-08T02:00:38.512Z",
    "dateReserved": "2024-11-01T01:21:50.375Z",
    "dateUpdated": "2025-07-08T14:14:59.180Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20084 (GCVE-0-2024-20084)
Vulnerability from cvelistv5
Published
2024-09-02 02:07
Modified
2024-10-27 02:38
CWE
Summary
In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944210; Issue ID: MSV-1561.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20084",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-03T14:21:55.582860Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-27T02:38:25.170Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8183, MT8188, MT8195, MT8390, MT8395, MT8673, MT8675, MT8676, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0 / Yocto 2.6, 3.3, 4.0 / openWRT 19.07, 21.02, 23.05 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944210; Issue ID: MSV-1561."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-02T02:07:29.670Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20084",
    "datePublished": "2024-09-02T02:07:29.670Z",
    "dateReserved": "2023-11-02T13:35:35.173Z",
    "dateUpdated": "2024-10-27T02:38:25.170Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20756 (GCVE-0-2023-20756)
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 21:42
Severity ?
CWE
  • Elevation of Privilege
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07549928.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.005Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20756",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T18:59:16.103998Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T21:42:31.141Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07549928."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:44:10.299Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20756",
    "datePublished": "2023-07-04T01:44:10.299Z",
    "dateReserved": "2022-10-28T02:03:10.771Z",
    "dateUpdated": "2024-12-04T21:42:31.141Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20644 (GCVE-0-2025-20644)
Vulnerability from cvelistv5
Published
2025-03-03 02:25
Modified
2025-03-04 16:21
CWE
Summary
In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20644",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-04T16:20:32.825212Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-04T16:21:10.735Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8791T, MT8795T, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1286",
              "description": "CWE-1286 Syntactic Correctness",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-03T02:25:27.877Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20644",
    "datePublished": "2025-03-03T02:25:27.877Z",
    "dateReserved": "2024-11-01T01:21:50.365Z",
    "dateUpdated": "2025-03-04T16:21:10.735Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20080 (GCVE-0-2024-20080)
Vulnerability from cvelistv5
Published
2024-07-01 03:18
Modified
2024-08-01 21:52
Severity ?
CWE
  • CWE-295 - Improper Certificate Validation
Summary
In gnss service, there is a possible escalation of privilege due to improper certificate validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08720039; Issue ID: MSV-1424.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2735",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2737",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "14.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20080",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-01T14:06:39.484309Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-23T16:18:54.966Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.660Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6761, MT6765, MT6768, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8666, MT8667, MT8673, MT8676, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0 / Yocto 2.6, 3.3, 4.0 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gnss service, there is a possible escalation of privilege due to improper certificate validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08720039; Issue ID: MSV-1424."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295 Improper Certificate Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-01T03:18:08.128Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20080",
    "datePublished": "2024-07-01T03:18:08.128Z",
    "dateReserved": "2023-11-02T13:35:35.172Z",
    "dateUpdated": "2024-08-01T21:52:31.660Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20152 (GCVE-0-2024-20152)
Vulnerability from cvelistv5
Published
2025-01-06 03:17
Modified
2025-01-06 14:12
CWE
Summary
In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20152",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T14:12:35.612710Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-06T14:12:39.277Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT3603, MT6835, MT6878, MT6886, MT6897, MT6990, MT7902, MT7920, MT7922, MT8518S, MT8532, MT8755, MT8766, MT8768, MT8775, MT8781, MT8796, MT8798, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0 / SDK release 2.4 and before / openWRT 23.05 / Yocto 3.3, 4.0, 5.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-617",
              "description": "CWE-617 Reachable Assertion",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T03:17:59.918Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20152",
    "datePublished": "2025-01-06T03:17:59.918Z",
    "dateReserved": "2023-11-02T13:35:35.188Z",
    "dateUpdated": "2025-01-06T14:12:39.277Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20048 (GCVE-0-2024-20048)
Vulnerability from cvelistv5
Published
2024-04-01 02:35
Modified
2024-08-01 21:52
CWE
  • Information Disclosure
Summary
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541769; Issue ID: ALPS08541769.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2713",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8173",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_13.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 6.2,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20048",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-21T19:21:04.306727Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-248",
                "description": "CWE-248 Uncaught Exception",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:50.765Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.769Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6781, MT6789, MT6835, MT6855, MT6879, MT6886, MT6895, MT6983, MT6985, MT6989, MT8167, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541769; Issue ID: ALPS08541769."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-01T02:35:09.283Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20048",
    "datePublished": "2024-04-01T02:35:09.283Z",
    "dateReserved": "2023-11-02T13:35:35.158Z",
    "dateUpdated": "2024-08-01T21:52:31.769Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20040 (GCVE-0-2024-20040)
Vulnerability from cvelistv5
Published
2024-04-01 02:34
Modified
2025-03-13 18:23
CWE
  • Elevation of Privilege
Summary
In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08360153 (for MT6XXX chipsets) / WCNCR00363530 (for MT79XX chipsets); Issue ID: MSV-979.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2713",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7902",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7915",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7916",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7920",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7921",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7922",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7925",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7927",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7981",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7986",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8370",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8395",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8518s",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8532",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              },
              {
                "status": "affected",
                "version": "14.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "linux_kernel",
            "vendor": "linux",
            "versions": [
              {
                "status": "affected",
                "version": "4.19"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20040",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-02T17:44:22.021834Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-13T18:23:26.908Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.513Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6580, MT6761, MT6762, MT6768, MT6781, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985, MT6989, MT6990, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8188, MT8195, MT8370, MT8390, MT8395, MT8518S, MT8532, MT8673, MT8678, MT8781, MT8791T, MT8792, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0 / Linux 4.19 / Yocto 3.3, 4.0 / OpenWrt 19.07, 21.02 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08360153 (for MT6XXX chipsets) / WCNCR00363530 (for MT79XX chipsets); Issue ID: MSV-979."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-01T02:34:53.921Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20040",
    "datePublished": "2024-04-01T02:34:53.921Z",
    "dateReserved": "2023-11-02T13:35:35.154Z",
    "dateUpdated": "2025-03-13T18:23:26.908Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20104 (GCVE-0-2024-20104)
Vulnerability from cvelistv5
Published
2024-11-04 01:48
Modified
2024-11-04 11:10
CWE
Summary
In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09073261; Issue ID: MSV-1772.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8370",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              },
              {
                "status": "affected",
                "version": "15.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:openwrt:luci:19.07.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:openwrt:openwrt:21.02:*:*:*:*:*:*:*",
              "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "openwrt",
            "vendor": "openwrt",
            "versions": [
              {
                "status": "affected",
                "version": "19.07.0"
              },
              {
                "status": "affected",
                "version": "21.02"
              },
              {
                "status": "affected",
                "version": "23.05"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 8.4,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20104",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-04T11:08:32.001855Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-04T11:10:59.833Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8188, MT8370, MT8390, MT8676",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0 / openWRT 19.07, 21.02, 23.05 / Yocto 4.0 /  RDK-B 22Q3, 24Q1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09073261; Issue ID: MSV-1772."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T01:48:38.377Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20104",
    "datePublished": "2024-11-04T01:48:38.377Z",
    "dateReserved": "2023-11-02T13:35:35.176Z",
    "dateUpdated": "2024-11-04T11:10:59.833Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20727 (GCVE-0-2023-20727)
Vulnerability from cvelistv5
Published
2023-06-06 08:02
Modified
2025-01-08 15:04
CWE
  • Information Disclosure
Summary
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588531; Issue ID: ALPS07588531.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.934Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20727",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-08T15:04:39.238728Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-08T15:04:44.843Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6789, MT6835, MT6855, MT6879, MT6886, MT6895, MT6983, MT6985, MT8168, MT8365, MT8695, MT8766, MT8768, MT8781, MT8786, MT8789, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / Yocto 4.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588531; Issue ID: ALPS07588531."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-06T08:02:55.869Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20727",
    "datePublished": "2023-06-06T08:02:55.869Z",
    "dateReserved": "2022-10-28T02:03:10.766Z",
    "dateUpdated": "2025-01-08T15:04:44.843Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20065 (GCVE-0-2024-20065)
Vulnerability from cvelistv5
Published
2024-06-03 02:04
Modified
2024-11-04 14:35
CWE
  • CWE-284 - Improper Access Control
Summary
In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08698617; Issue ID: MSV-1394.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20065",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-03T13:48:20.768498Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-04T14:35:05.033Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.559Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6768, MT6781, MT6835, MT6853, MT6855, MT6877, MT6879, MT6885, MT6886, MT6893, MT6983, MT6985, MT6989",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08698617; Issue ID: MSV-1394."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-03T02:04:42.174Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20065",
    "datePublished": "2024-06-03T02:04:42.174Z",
    "dateReserved": "2023-11-02T13:35:35.170Z",
    "dateUpdated": "2024-11-04T14:35:05.033Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20151 (GCVE-0-2024-20151)
Vulnerability from cvelistv5
Published
2025-01-06 03:17
Modified
2025-01-06 14:13
CWE
Summary
In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: MOLY01399339; Issue ID: MSV-1928.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20151",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T14:13:09.475011Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-06T14:13:12.730Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT2739, MT6789, MT6813, MT6815, MT6835, MT6835T, MT6855, MT6878, MT6878T, MT6879, MT6886, MT6895, MT6895T, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6985, MT6986, MT6986D, MT6988, MT6989, MT6990, MT6991, MT8676, MT8678, MT8798, MT8863",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR16, NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: MOLY01399339; Issue ID: MSV-1928."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T03:17:58.239Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20151",
    "datePublished": "2025-01-06T03:17:58.239Z",
    "dateReserved": "2023-11-02T13:35:35.188Z",
    "dateUpdated": "2025-01-06T14:13:12.730Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32866 (GCVE-0-2023-32866)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-02 15:32
Severity ?
CWE
  • Elevation of Privilege
Summary
In mmp, there is a possible memory corruption due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07342152; Issue ID: ALPS07342152.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:45.302Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8188, MT8195, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In mmp, there is a possible memory corruption due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07342152; Issue ID: ALPS07342152."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:18.401Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32866",
    "datePublished": "2023-12-04T03:46:18.401Z",
    "dateReserved": "2023-05-16T03:04:32.162Z",
    "dateUpdated": "2024-08-02T15:32:45.302Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20146 (GCVE-0-2024-20146)
Vulnerability from cvelistv5
Published
2025-01-06 03:17
Modified
2025-01-08 04:55
CWE
Summary
In wlan STA driver, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389496 / ALPS09137491; Issue ID: MSV-1835.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20146",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-07T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-08T04:55:49.141Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT3603, MT6835, MT6878, MT6886, MT6897, MT6990, MT7902, MT7920, MT7922, MT8365, MT8518S, MT8532, MT8666, MT8667, MT8673, MT8755, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8796, MT8798, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0 / SDK release 2.5 and before / openWRT 23.05 / Yocto 3.3, 4.0, 5.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan STA driver, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389496 / ALPS09137491; Issue ID: MSV-1835."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T03:17:49.872Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20146",
    "datePublished": "2025-01-06T03:17:49.872Z",
    "dateReserved": "2023-11-02T13:35:35.186Z",
    "dateUpdated": "2025-01-08T04:55:49.141Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20761 (GCVE-0-2023-20761)
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 21:41
Severity ?
CWE
  • Elevation of Privilege
Summary
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628604; Issue ID: ALPS07628582.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.974Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20761",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T19:07:19.144141Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T21:41:39.995Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628604; Issue ID: ALPS07628582."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:44:23.740Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20761",
    "datePublished": "2023-07-04T01:44:23.740Z",
    "dateReserved": "2022-10-28T02:03:10.771Z",
    "dateUpdated": "2024-12-04T21:41:39.995Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20772 (GCVE-0-2023-20772)
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 21:40
Severity ?
CWE
  • Elevation of Privilege
Summary
In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441796; Issue ID: ALPS07441796.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.966Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20772",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T19:10:31.489658Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T21:40:28.570Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8781, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441796; Issue ID: ALPS07441796."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:44:36.258Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20772",
    "datePublished": "2023-07-04T01:44:36.258Z",
    "dateReserved": "2022-10-28T02:03:10.774Z",
    "dateUpdated": "2024-12-04T21:40:28.570Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32868 (GCVE-0-2023-32868)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-02 15:32
Severity ?
CWE
  • Elevation of Privilege
Summary
In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363632; Issue ID: ALPS07363632.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:45.347Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8188, MT8195, MT8673, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363632; Issue ID: ALPS07363632."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:21.321Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32868",
    "datePublished": "2023-12-04T03:46:21.321Z",
    "dateReserved": "2023-05-16T03:04:32.163Z",
    "dateUpdated": "2024-08-02T15:32:45.347Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20773 (GCVE-0-2023-20773)
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 20:58
Severity ?
CWE
  • Elevation of Privilege
Summary
In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07611449; Issue ID: ALPS07441735.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.977Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20773",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T20:58:16.411458Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T20:58:35.029Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8781, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07611449; Issue ID: ALPS07441735."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:44:38.761Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20773",
    "datePublished": "2023-07-04T01:44:38.761Z",
    "dateReserved": "2022-10-28T02:03:10.774Z",
    "dateUpdated": "2024-12-04T20:58:35.029Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32829 (GCVE-0-2023-32829)
Vulnerability from cvelistv5
Published
2023-10-02 02:05
Modified
2024-09-21 15:20
CWE
  • Elevation of Privilege
Summary
In apusys, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07713478; Issue ID: ALPS07713478.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.079Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8137:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8137",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8139:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8139",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195z:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195z",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8395",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32829",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-21T15:20:25.750588Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-190",
                "description": "CWE-190 Integer Overflow or Wraparound",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-21T15:20:30.194Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6879, MT6886, MT6891, MT6895, MT6896, MT6983, MT6985, MT8137, MT8139, MT8188, MT8195, MT8195Z, MT8390, MT8395",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / Yocto 3.1, 3.3, 4.0 / IOT-v23.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In apusys, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07713478; Issue ID: ALPS07713478."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-02T02:05:42.049Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32829",
    "datePublished": "2023-10-02T02:05:42.049Z",
    "dateReserved": "2023-05-16T03:04:32.150Z",
    "dateUpdated": "2024-09-21T15:20:30.194Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20012 (GCVE-0-2024-20012)
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2025-05-09 16:35
CWE
  • Elevation of Privilege
Summary
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.535Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20012",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-13T05:00:42.456531Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-843",
                "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-09T16:35:33.691Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6895, MT6983, MT6985, MT8321, MT8385, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-05T05:59:35.241Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20012",
    "datePublished": "2024-02-05T05:59:35.241Z",
    "dateReserved": "2023-11-02T13:35:35.150Z",
    "dateUpdated": "2025-05-09T16:35:33.691Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32885 (GCVE-0-2023-32885)
Vulnerability from cvelistv5
Published
2024-01-02 02:49
Modified
2025-04-17 18:52
CWE
  • Elevation of Privilege
Summary
In display drm, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780685; Issue ID: ALPS07780685.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:45.835Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32885",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-09T15:21:27.278544Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-119",
                "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-17T18:52:16.226Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8168, MT8188, MT8195, MT8766, MT8768, MT8781, MT8789, MT8791T, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display drm, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780685; Issue ID: ALPS07780685."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:49:58.321Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32885",
    "datePublished": "2024-01-02T02:49:58.321Z",
    "dateReserved": "2023-05-16T03:04:32.173Z",
    "dateUpdated": "2025-04-17T18:52:16.226Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20089 (GCVE-0-2024-20089)
Vulnerability from cvelistv5
Published
2024-09-02 02:07
Modified
2024-09-03 14:14
CWE
  • CWE-703 - Improper Check or Handling of Exceptional Conditions
Summary
In wlan, there is a possible denial of service due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08861558; Issue ID: MSV-1526.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8775",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8792",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "13.0"
              },
              {
                "status": "affected",
                "version": "14.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
              "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "yocto",
            "vendor": "linuxfoundation",
            "versions": [
              {
                "status": "affected",
                "version": "2.6"
              },
              {
                "status": "affected",
                "version": "3.3"
              },
              {
                "status": "affected",
                "version": "4.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20089",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-03T14:13:06.564754Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-754",
                "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-03T14:14:40.888Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6835, MT6878, MT6886, MT6897, MT6980, MT6985, MT6989, MT6990, MT8678, MT8775, MT8792, MT8796",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0 / Yocto 2.6, 3.3, 4.0 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan, there is a possible denial of service due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08861558; Issue ID: MSV-1526."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-703",
              "description": "CWE-703 Improper Check or Handling of Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-02T02:07:37.971Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20089",
    "datePublished": "2024-09-02T02:07:37.971Z",
    "dateReserved": "2023-11-02T13:35:35.174Z",
    "dateUpdated": "2024-09-03T14:14:40.888Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20696 (GCVE-0-2025-20696)
Vulnerability from cvelistv5
Published
2025-08-04 01:49
Modified
2025-08-04 13:47
CWE
Summary
In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09915215; Issue ID: MSV-3801.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.8,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20696",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-04T13:47:23.786152Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-04T13:47:57.557Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6813, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6990, MT6991, MT8188, MT8196, MT8370, MT8390, MT8676",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0 / openWRT 21.02, 23.05 / Yocto 4.0 / RDK-B 24Q1 / Zephyr 3.7.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09915215; Issue ID: MSV-3801."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-04T01:49:46.880Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20696",
    "datePublished": "2025-08-04T01:49:46.880Z",
    "dateReserved": "2024-11-01T01:21:50.381Z",
    "dateUpdated": "2025-08-04T13:47:57.557Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20064 (GCVE-0-2024-20064)
Vulnerability from cvelistv5
Published
2024-05-06 02:51
Modified
2025-03-28 23:59
CWE
  • CWE-20 - Improper Input Validation
Summary
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08572601; Issue ID: MSV-1229.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8755",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8775",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8792",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_13.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20064",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-06T17:37:56.284276Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-28T23:59:08.910Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.625Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6761, MT6762, MT6768, MT6781, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT6989, MT8678, MT8755, MT8775, MT8792, MT8796",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08572601; Issue ID: MSV-1229."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-06T02:51:58.538Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20064",
    "datePublished": "2024-05-06T02:51:58.538Z",
    "dateReserved": "2023-11-02T13:35:35.170Z",
    "dateUpdated": "2025-03-28T23:59:08.910Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20753 (GCVE-0-2023-20753)
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 17:30
Severity ?
CWE
  • Elevation of Privilege
Summary
In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07588667.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.980Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20753",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T17:29:57.960827Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T17:30:09.749Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07588667."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:44:07.720Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20753",
    "datePublished": "2023-07-04T01:44:07.720Z",
    "dateReserved": "2022-10-28T02:03:10.771Z",
    "dateUpdated": "2024-12-04T17:30:09.749Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20074 (GCVE-0-2024-20074)
Vulnerability from cvelistv5
Published
2024-06-03 02:04
Modified
2024-08-01 21:52
CWE
Summary
In dmc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08668110; Issue ID: MSV-1333.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.6,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20074",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-04T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-05T04:01:17.580Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.789Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6983, MT6985, MT6989, MT8666, MT8667, MT8673, MT8676",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In dmc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08668110; Issue ID: MSV-1333."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-03T02:04:56.653Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20074",
    "datePublished": "2024-06-03T02:04:56.653Z",
    "dateReserved": "2023-11-02T13:35:35.171Z",
    "dateUpdated": "2024-08-01T21:52:31.789Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20766 (GCVE-0-2023-20766)
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 21:41
Severity ?
CWE
  • Elevation of Privilege
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573237; Issue ID: ALPS07573202.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.134Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20766",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T19:08:02.628965Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T21:41:27.363Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6735, MT6739, MT6753, MT6757, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6886, MT6891, MT6893, MT6895, MT6983, MT6985, MT8167, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573237; Issue ID: ALPS07573202."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:44:26.268Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20766",
    "datePublished": "2023-07-04T01:44:26.268Z",
    "dateReserved": "2022-10-28T02:03:10.773Z",
    "dateUpdated": "2024-12-04T21:41:27.363Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20051 (GCVE-0-2024-20051)
Vulnerability from cvelistv5
Published
2024-04-01 02:35
Modified
2024-11-04 14:33
CWE
  • Denial of Service
Summary
In flashc, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541758.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "LOW",
              "baseScore": 2.3,
              "baseSeverity": "LOW",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20051",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-01T17:48:41.268314Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-04T14:33:43.217Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.598Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2737, MT6781, MT6789, MT6835, MT6855, MT6879, MT6880, MT6886, MT6890, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8167, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0 / OpenWrt 19.07, 21.02 / Yocto 3.3 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In flashc, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541758."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-01T02:35:14.528Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20051",
    "datePublished": "2024-04-01T02:35:14.528Z",
    "dateReserved": "2023-11-02T13:35:35.159Z",
    "dateUpdated": "2024-11-04T14:33:43.217Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20088 (GCVE-0-2024-20088)
Vulnerability from cvelistv5
Published
2024-09-02 02:07
Modified
2025-03-13 18:18
CWE
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08932099; Issue ID: MSV-1543.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20088",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-03T14:16:32.431075Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-13T18:18:40.795Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6765, MT6768, MT6781, MT6833, MT6835, MT6855, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6983, MT6985, MT6989, MT8321, MT8755, MT8765, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8792, MT8796",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08932099; Issue ID: MSV-1543."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-02T02:07:36.385Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20088",
    "datePublished": "2024-09-02T02:07:36.385Z",
    "dateReserved": "2023-11-02T13:35:35.173Z",
    "dateUpdated": "2025-03-13T18:18:40.795Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20052 (GCVE-0-2024-20052)
Vulnerability from cvelistv5
Published
2024-04-01 02:35
Modified
2024-10-29 20:54
CWE
  • Information Disclosure
Summary
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541761.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20052",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-27T20:27:41.382595Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-29T20:54:35.081Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.638Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2737, MT6781, MT6789, MT6835, MT6855, MT6879, MT6880, MT6886, MT6890, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8167, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0 / OpenWrt 19.07, 21.02 / Yocto 3.3 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541761."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-01T02:35:16.365Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20052",
    "datePublished": "2024-04-01T02:35:16.365Z",
    "dateReserved": "2023-11-02T13:35:35.159Z",
    "dateUpdated": "2024-10-29T20:54:35.081Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20015 (GCVE-0-2024-20015)
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2024-08-01 21:52
CWE
  • Elevation of Privilege
Summary
In telephony, there is a possible escalation of privilege due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08441419; Issue ID: ALPS08441419.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6753",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6757",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6763",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.4,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20015",
                "options": [
                  {
                    "Exploitation": "None"
                  },
                  {
                    "Automatable": "No"
                  },
                  {
                    "Technical Impact": "Total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-13T05:00:44.108228Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-305",
                "description": "CWE-305 Authentication Bypass by Primary Weakness",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:33.019Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.653Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6753, MT6757, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6781, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8321, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In telephony, there is a possible escalation of privilege due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08441419; Issue ID: ALPS08441419."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-05T05:59:38.166Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20015",
    "datePublished": "2024-02-05T05:59:38.166Z",
    "dateReserved": "2023-11-02T13:35:35.150Z",
    "dateUpdated": "2024-08-01T21:52:31.653Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20081 (GCVE-0-2024-20081)
Vulnerability from cvelistv5
Published
2024-07-01 03:18
Modified
2025-03-13 18:33
Severity ?
CWE
Summary
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08719602; Issue ID: MSV-1412.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2735",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2737",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "14.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20081",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-01T13:50:05.430210Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-13T18:33:29.985Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.603Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6761, MT6765, MT6768, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8666, MT8667, MT8673, MT8676, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0 / openWRT 19.07, 21.02, 23.05 / Yocto 2.6, 3.3, 4.0 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08719602; Issue ID: MSV-1412."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-01T03:18:10.073Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20081",
    "datePublished": "2024-07-01T03:18:10.073Z",
    "dateReserved": "2023-11-02T13:35:35.173Z",
    "dateUpdated": "2025-03-13T18:33:29.985Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20728 (GCVE-0-2023-20728)
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-07 20:16
CWE
  • Information Disclosure
Summary
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573603; Issue ID: ALPS07573603.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.968Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20728",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-07T20:15:22.202999Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-07T20:16:26.319Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6781, MT6789, MT6833, MT6835, MT6855, MT6877, MT6879, MT6886, MT6895, MT6983, MT6985, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8168, MT8175, MT8185, MT8195, MT8362A, MT8365, MT8385, MT8395, MT8518, MT8532, MT8673, MT8675, MT8695, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / Yocto 3.1, 3.3, 4.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573603; Issue ID: ALPS07573603."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-06T12:11:07.153Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20728",
    "datePublished": "2023-06-06T12:11:07.153Z",
    "dateReserved": "2022-10-28T02:03:10.766Z",
    "dateUpdated": "2025-01-07T20:16:26.319Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20825 (GCVE-0-2023-20825)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-10 15:38
Severity ?
CWE
  • Information Disclosure
Summary
In duraspeed, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07951402; Issue ID: ALPS07951413.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.973Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20825",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T15:38:03.399534Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-10T15:38:20.423Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6580, MT6735, MT6739, MT6761, MT6762, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8168, MT8175, MT8188, MT8195, MT8321, MT8365, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In duraspeed, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07951402; Issue ID: ALPS07951413."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:23.998Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20825",
    "datePublished": "2023-09-04T02:27:23.998Z",
    "dateReserved": "2022-10-28T02:03:23.682Z",
    "dateUpdated": "2024-10-10T15:38:20.423Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20107 (GCVE-0-2024-20107)
Vulnerability from cvelistv5
Published
2024-11-04 01:48
Modified
2024-11-04 10:56
CWE
Summary
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09124360; Issue ID: MSV-1823.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 6.2,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20107",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-04T10:56:23.620128Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-04T10:56:52.956Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8188, MT8370, MT8390, MT8676",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0 / openWRT 19.07, 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09124360; Issue ID: MSV-1823."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T01:48:42.111Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20107",
    "datePublished": "2024-11-04T01:48:42.111Z",
    "dateReserved": "2023-11-02T13:35:35.176Z",
    "dateUpdated": "2024-11-04T10:56:52.956Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20819 (GCVE-0-2023-20819)
Vulnerability from cvelistv5
Published
2023-10-02 02:05
Modified
2024-09-21 15:27
CWE
  • Elevation of Privilege
Summary
In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.994Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2731",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6570:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6570",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6595",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6732",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6735",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6737",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6737m:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6737m",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6738:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6738",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6750",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6750s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6752",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6753",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6755",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6757",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6758",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762d",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762m",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6763",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6767",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769z",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6775",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6783",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6795",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6799",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6813",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6815",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8675",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766z:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766z",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768b:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768b",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768z:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768z",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788x:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788x",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788z:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788z",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20819",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-21T15:26:25.287276Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-21T15:27:05.080Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2731, MT6570, MT6580, MT6595, MT6732, MT6735, MT6737, MT6737M, MT6738, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6757, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6795, MT6797, MT6799, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6983, MT6985, MT6989, MT8666, MT8666A, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766Z, MT8768, MT8768A, MT8768B, MT8768T, MT8768Z, MT8781, MT8786, MT8788, MT8788T, MT8788X, MT8788Z, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR11, LR12A, LR13, NR15, NR16, NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-02T02:05:25.077Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20819",
    "datePublished": "2023-10-02T02:05:25.077Z",
    "dateReserved": "2022-10-28T02:03:23.673Z",
    "dateUpdated": "2024-09-21T15:27:05.080Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32847 (GCVE-0-2023-32847)
Vulnerability from cvelistv5
Published
2023-12-04 03:45
Modified
2024-08-02 15:32
Severity ?
CWE
  • Elevation of Privilege
Summary
In audio, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08241940; Issue ID: ALPS08241940.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:45.099Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6580, MT6739, MT6761, MT6762, MT6765, MT6779, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In audio, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08241940; Issue ID: ALPS08241940."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:45:41.985Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32847",
    "datePublished": "2023-12-04T03:45:41.985Z",
    "dateReserved": "2023-05-16T03:04:32.155Z",
    "dateUpdated": "2024-08-02T15:32:45.099Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32817 (GCVE-0-2023-32817)
Vulnerability from cvelistv5
Published
2023-09-04 02:28
Modified
2024-10-08 20:39
Severity ?
CWE
  • Elevation of Privilege
Summary
In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: ALPS08044035.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.059Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32817",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-08T14:00:15.323540Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-08T20:39:56.429Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6895, MT6983, MT6985, MT8168, MT8175, MT8188, MT8195, MT8365, MT8666, MT8667, MT8673",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: ALPS08044035."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:28:28.890Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32817",
    "datePublished": "2023-09-04T02:28:28.890Z",
    "dateReserved": "2023-05-16T03:04:32.147Z",
    "dateUpdated": "2024-10-08T20:39:56.429Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32875 (GCVE-0-2023-32875)
Vulnerability from cvelistv5
Published
2024-01-02 02:49
Modified
2025-06-16 18:33
CWE
  • Information Disclosure
Summary
In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08304217.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:45.331Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32875",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-22T20:31:49.361360Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-16T18:33:19.979Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08304217."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:49:39.992Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32875",
    "datePublished": "2024-01-02T02:49:39.992Z",
    "dateReserved": "2023-05-16T03:04:32.171Z",
    "dateUpdated": "2025-06-16T18:33:19.979Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32865 (GCVE-0-2023-32865)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-28 18:51
Severity ?
CWE
  • Elevation of Privilege
Summary
In display drm, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363456; Issue ID: ALPS07363456.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.552Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12,0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12,0_13,0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12,0_13,0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12,0_13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android12.0_13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32865",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-28T17:53:09.725440Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T18:51:25.922Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8168, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display drm, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363456; Issue ID: ALPS07363456."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:16.869Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32865",
    "datePublished": "2023-12-04T03:46:16.869Z",
    "dateReserved": "2023-05-16T03:04:32.162Z",
    "dateUpdated": "2024-08-28T18:51:25.922Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20049 (GCVE-0-2024-20049)
Vulnerability from cvelistv5
Published
2024-04-01 02:35
Modified
2025-03-13 16:44
CWE
  • Information Disclosure
Summary
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541765; Issue ID: ALPS08541765.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.648Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20049",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-01T19:39:33.120815Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-248",
                "description": "CWE-248 Uncaught Exception",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-13T16:44:57.311Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2737, MT6781, MT6789, MT6835, MT6855, MT6879, MT6880, MT6886, MT6890, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8167, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 19.07, 21.02 / Yocto 3.3 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541765; Issue ID: ALPS08541765."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-01T02:35:11.038Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20049",
    "datePublished": "2024-04-01T02:35:11.038Z",
    "dateReserved": "2023-11-02T13:35:35.158Z",
    "dateUpdated": "2025-03-13T16:44:57.311Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20830 (GCVE-0-2023-20830)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-10 15:25
CWE
  • Elevation of Privilege
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014156.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.212Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2713",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2735",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8173",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20830",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T15:24:46.560034Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-10T15:25:53.574Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2735, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8168, MT8173, MT8195, MT8362A, MT8365, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014156."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:32.386Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20830",
    "datePublished": "2023-09-04T02:27:32.386Z",
    "dateReserved": "2022-10-28T02:03:23.685Z",
    "dateUpdated": "2024-10-10T15:25:53.574Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20659 (GCVE-0-2025-20659)
Vulnerability from cvelistv5
Published
2025-04-07 03:14
Modified
2025-04-07 14:18
CWE
Summary
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01519028; Issue ID: MSV-2768.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20659",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T14:17:04.517691Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T14:18:54.949Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8796, MT8797, MT8798, MT8863",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, LR13, NR15, NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01519028; Issue ID: MSV-2768."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-07T03:14:54.034Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20659",
    "datePublished": "2025-04-07T03:14:54.034Z",
    "dateReserved": "2024-11-01T01:21:50.367Z",
    "dateUpdated": "2025-04-07T14:18:54.949Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20147 (GCVE-0-2024-20147)
Vulnerability from cvelistv5
Published
2025-02-03 03:24
Modified
2025-02-03 16:24
CWE
Summary
In Bluetooth FW, there is a possible reachable assertion due to improper exception handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389046 (Note: For MT79XX chipsets) / ALPS09136501 (Note: For MT2737, MT3603, MT6XXX, and MT8XXX chipsets); Issue ID: MSV-1797.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20147",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-03T16:19:17.342826Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-617",
                "description": "CWE-617 Reachable Assertion",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-03T16:24:37.635Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT3603, MT6835, MT6878, MT6886, MT6897, MT6985, MT6989, MT6990, MT7902, MT7920, MT7921, MT7922, MT7925, MT7927, MT8195, MT8370, MT8390, MT8395, MT8518S, MT8532, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0 / SDK release 2.5, 3.5 and before / openWRT 23.05 / Yocto 3.3, 4.0, 5.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Bluetooth FW, there is a possible reachable assertion due to improper exception handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389046 (Note: For MT79XX chipsets) / ALPS09136501 (Note: For MT2737, MT3603, MT6XXX, and MT8XXX chipsets); Issue ID: MSV-1797."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-617",
              "description": "CWE-617 Reachable Assertion",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-03T03:24:09.635Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20147",
    "datePublished": "2025-02-03T03:24:09.635Z",
    "dateReserved": "2023-11-02T13:35:35.186Z",
    "dateUpdated": "2025-02-03T16:24:37.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20053 (GCVE-0-2024-20053)
Vulnerability from cvelistv5
Published
2024-04-01 02:35
Modified
2024-08-01 21:52
CWE
  • Elevation of Privilege
Summary
In flashc, there is a possible out of bounds write due to an uncaught exception. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541764.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2713",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2737",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8173",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8395",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 8.4,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20053",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-21T18:57:45.880667Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:45.348Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.679Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2737, MT6781, MT6789, MT6835, MT6855, MT6879, MT6880, MT6886, MT6890, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8167, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0 / OpenWrt 19.07, 21.02 / Yocto 3.3 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In flashc, there is a possible out of bounds write due to an uncaught exception. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541764."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-01T02:35:18.101Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20053",
    "datePublished": "2024-04-01T02:35:18.101Z",
    "dateReserved": "2023-11-02T13:35:35.159Z",
    "dateUpdated": "2024-08-01T21:52:31.679Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20821 (GCVE-0-2023-20821)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-10 17:06
CWE
  • Elevation of Privilege
Summary
In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937113; Issue ID: ALPS07937113.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.174Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2713",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2735",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8173",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8185",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8395",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8675",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20821",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T17:04:56.340129Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-10T17:06:16.142Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2735, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937113; Issue ID: ALPS07937113."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:17.577Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20821",
    "datePublished": "2023-09-04T02:27:17.577Z",
    "dateReserved": "2022-10-28T02:03:23.673Z",
    "dateUpdated": "2024-10-10T17:06:16.142Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20816 (GCVE-0-2023-20816)
Vulnerability from cvelistv5
Published
2023-08-07 03:22
Modified
2024-10-22 14:29
CWE
  • Elevation of Privilege
Summary
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453589; Issue ID: ALPS07453589.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.152Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20816",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T14:26:28.124909Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T14:29:38.918Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453589; Issue ID: ALPS07453589."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:22:11.465Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20816",
    "datePublished": "2023-08-07T03:22:11.465Z",
    "dateReserved": "2022-10-28T02:03:23.673Z",
    "dateUpdated": "2024-10-22T14:29:38.918Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20112 (GCVE-0-2024-20112)
Vulnerability from cvelistv5
Published
2024-11-04 01:48
Modified
2024-11-04 10:49
CWE
Summary
In isp, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09071481; Issue ID: MSV-1730.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "13.0"
              },
              {
                "status": "affected",
                "version": "14.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20112",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-04T10:48:46.262016Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-04T10:49:21.752Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6878, MT6886, MT6897, MT6985, MT8676",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In isp, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09071481; Issue ID: MSV-1730."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T01:48:50.907Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20112",
    "datePublished": "2024-11-04T01:48:50.907Z",
    "dateReserved": "2023-11-02T13:35:35.178Z",
    "dateUpdated": "2024-11-04T10:49:21.752Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32869 (GCVE-0-2023-32869)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-12-02 17:35
Severity ?
CWE
  • Elevation of Privilege
Summary
In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363632; Issue ID: ALPS07363689.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.490Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32869",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-12-06T20:34:35.845792Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-02T17:35:42.950Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8188, MT8195, MT8673, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363632; Issue ID: ALPS07363689."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:22.727Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32869",
    "datePublished": "2023-12-04T03:46:22.727Z",
    "dateReserved": "2023-05-16T03:04:32.163Z",
    "dateUpdated": "2024-12-02T17:35:42.950Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20050 (GCVE-0-2024-20050)
Vulnerability from cvelistv5
Published
2024-04-01 02:35
Modified
2024-10-30 19:46
CWE
  • Information Disclosure
Summary
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541757.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20050",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-01T17:55:04.864297Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-922",
                "description": "CWE-922 Insecure Storage of Sensitive Information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-30T19:46:46.867Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.809Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2737, MT6781, MT6789, MT6835, MT6855, MT6879, MT6880, MT6886, MT6890, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8167, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0 / OpenWrt 19.07, 21.02 / Yocto 3.3 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541757."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-01T02:35:12.789Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20050",
    "datePublished": "2024-04-01T02:35:12.789Z",
    "dateReserved": "2023-11-02T13:35:35.159Z",
    "dateUpdated": "2024-10-30T19:46:46.867Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32846 (GCVE-0-2023-32846)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-02 15:32
Severity ?
CWE
  • Denial of Service
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01138453 (MSV-861).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.543Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, and NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01138453 (MSV-861)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:06.378Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32846",
    "datePublished": "2023-12-04T03:46:06.378Z",
    "dateReserved": "2023-05-16T03:04:32.155Z",
    "dateUpdated": "2024-08-02T15:32:46.543Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32889 (GCVE-0-2023-32889)
Vulnerability from cvelistv5
Published
2024-01-02 02:50
Modified
2025-06-18 15:03
CWE
  • Denial of Service
Summary
In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161825; Issue ID: MOLY01161825 (MSV-895).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.473Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32889",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-02T19:57:59.307673Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-18T15:03:13.062Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, and NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161825; Issue ID: MOLY01161825 (MSV-895)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:50:05.797Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32889",
    "datePublished": "2024-01-02T02:50:05.797Z",
    "dateReserved": "2023-05-16T03:04:32.174Z",
    "dateUpdated": "2025-06-18T15:03:13.062Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20815 (GCVE-0-2023-20815)
Vulnerability from cvelistv5
Published
2023-08-07 03:22
Modified
2024-10-22 14:35
CWE
  • Elevation of Privilege
Summary
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453587; Issue ID: ALPS07453587.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.226Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20815",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T14:28:08.021847Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T14:35:21.013Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453587; Issue ID: ALPS07453587."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:22:09.392Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20815",
    "datePublished": "2023-08-07T03:22:09.392Z",
    "dateReserved": "2022-10-28T02:03:23.672Z",
    "dateUpdated": "2024-10-22T14:35:21.013Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20834 (GCVE-0-2023-20834)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-21 16:55
CWE
  • Elevation of Privilege
Summary
In pda, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07608514; Issue ID: ALPS07608514.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.121Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Android 12.0"
              },
              {
                "status": "affected",
                "version": "Android 13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20834",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T17:15:44.705404Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-362",
                "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          },
          {
            "descriptions": [
              {
                "cweId": "CWE-416",
                "description": "CWE-416 Use After Free",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T16:55:42.131Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6879, MT6886, MT6895, MT6983, MT6985, MT8175, MT8188, MT8195, MT8365, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In pda, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07608514; Issue ID: ALPS07608514."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:38.962Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20834",
    "datePublished": "2023-09-04T02:27:38.962Z",
    "dateReserved": "2022-10-28T02:03:23.686Z",
    "dateUpdated": "2024-10-21T16:55:42.131Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20670 (GCVE-0-2025-20670)
Vulnerability from cvelistv5
Published
2025-05-05 02:49
Modified
2025-05-12 17:56
CWE
  • CWE-295 - Improper Certificate Validation
Summary
In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 5.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20670",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-12T17:54:25.427281Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-12T17:56:04.826Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295 Improper Certificate Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-05T02:49:16.856Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20670",
    "datePublished": "2025-05-05T02:49:16.856Z",
    "dateReserved": "2024-11-01T01:21:50.370Z",
    "dateUpdated": "2025-05-12T17:56:04.826Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32815 (GCVE-0-2023-32815)
Vulnerability from cvelistv5
Published
2023-09-04 02:28
Modified
2024-10-08 20:11
Severity ?
CWE
  • Elevation of Privilege
Summary
In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08037801; Issue ID: ALPS08037801.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.121Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32815",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-08T14:00:17.767811Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-08T20:11:52.179Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2735, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6895, MT6980, MT6983, MT6985, MT6990, MT8168, MT8175, MT8188, MT8188T, MT8195, MT8365",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08037801; Issue ID: ALPS08037801."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:28:25.569Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32815",
    "datePublished": "2023-09-04T02:28:25.569Z",
    "dateReserved": "2023-05-16T03:04:32.146Z",
    "dateUpdated": "2024-10-08T20:11:52.179Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20143 (GCVE-0-2024-20143)
Vulnerability from cvelistv5
Published
2025-01-06 03:17
Modified
2025-01-06 14:19
CWE
Summary
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.6,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20143",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T14:19:37.341122Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-06T14:19:40.346Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0 / openWRT 19.07, 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T03:17:44.887Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20143",
    "datePublished": "2025-01-06T03:17:44.887Z",
    "dateReserved": "2023-11-02T13:35:35.184Z",
    "dateUpdated": "2025-01-06T14:19:40.346Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20057 (GCVE-0-2024-20057)
Vulnerability from cvelistv5
Published
2024-05-06 02:51
Modified
2025-03-27 16:47
CWE
Summary
In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08587881; Issue ID: ALPS08587881.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8755",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8792",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8795t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.2,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20057",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-07T04:00:27.398101Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-27T16:47:12.709Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.768Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6983, MT8321, MT8385, MT8755, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8792, MT8795T, MT8796",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08587881; Issue ID: ALPS08587881."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-06T02:51:48.972Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20057",
    "datePublished": "2024-05-06T02:51:48.972Z",
    "dateReserved": "2023-11-02T13:35:35.162Z",
    "dateUpdated": "2025-03-27T16:47:12.709Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32861 (GCVE-0-2023-32861)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-12-02 17:36
Severity ?
CWE
  • Elevation of Privilege
Summary
In display, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08059081; Issue ID: ALPS08059081.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:45.561Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32861",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-12-06T20:49:47.419651Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-02T17:36:33.510Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8167, MT8168, MT8188, MT8195, MT8673",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08059081; Issue ID: ALPS08059081."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:10.860Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32861",
    "datePublished": "2023-12-04T03:46:10.860Z",
    "dateReserved": "2023-05-16T03:04:32.160Z",
    "dateUpdated": "2024-12-02T17:36:33.510Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20782 (GCVE-0-2023-20782)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:39
Severity ?
CWE
  • Information Disclosure
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550103.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.130Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20782",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:38:38.683318Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:39:18.686Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550103."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:04.622Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20782",
    "datePublished": "2023-08-07T03:21:04.622Z",
    "dateReserved": "2022-10-28T02:03:10.776Z",
    "dateUpdated": "2024-10-17T14:39:18.686Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20635 (GCVE-0-2025-20635)
Vulnerability from cvelistv5
Published
2025-02-03 03:23
Modified
2025-03-13 19:47
CWE
Summary
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09403752; Issue ID: MSV-2434.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.6,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20635",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-03T16:23:18.686276Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-13T19:47:12.833Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0 / openWRT 19.07, 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09403752; Issue ID: MSV-2434."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-03T03:23:51.354Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20635",
    "datePublished": "2025-02-03T03:23:51.354Z",
    "dateReserved": "2024-11-01T01:21:50.362Z",
    "dateUpdated": "2025-03-13T19:47:12.833Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20037 (GCVE-0-2024-20037)
Vulnerability from cvelistv5
Published
2024-03-04 02:43
Modified
2024-08-22 18:31
CWE
  • Elevation of Privilege
Summary
In pq, there is a possible write-what-where condition due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495937; Issue ID: ALPS08495937.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.647Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8675",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              },
              {
                "status": "affected",
                "version": "14.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20037",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-05T15:43:55.415909Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-754",
                "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-22T18:31:07.508Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6983, MT6985, MT6989, MT8168, MT8188, MT8195, MT8673, MT8675",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In pq, there is a possible write-what-where condition due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495937; Issue ID: ALPS08495937."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-04T02:43:53.317Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20037",
    "datePublished": "2024-03-04T02:43:53.317Z",
    "dateReserved": "2023-11-02T13:35:35.153Z",
    "dateUpdated": "2024-08-22T18:31:07.508Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20783 (GCVE-0-2023-20783)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-11-14 15:00
Severity ?
CWE
  • Elevation of Privilege
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826905; Issue ID: ALPS07826905.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.968Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20783",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-14T15:00:04.910781Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-14T15:00:14.635Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826905; Issue ID: ALPS07826905."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:06.590Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20783",
    "datePublished": "2023-08-07T03:21:06.590Z",
    "dateReserved": "2022-10-28T02:03:10.777Z",
    "dateUpdated": "2024-11-14T15:00:14.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20038 (GCVE-0-2024-20038)
Vulnerability from cvelistv5
Published
2024-03-04 02:43
Modified
2024-11-19 19:00
CWE
  • Information Disclosure
Summary
In pq, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495932; Issue ID: ALPS08495932.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 3.4,
              "baseSeverity": "LOW",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20038",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-04T16:52:52.427715Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-19T19:00:32.296Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.783Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6983, MT6985, MT6989, MT8168, MT8188, MT8195, MT8673, MT8675",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In pq, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08495932; Issue ID: ALPS08495932."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-04T02:43:54.898Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20038",
    "datePublished": "2024-03-04T02:43:54.898Z",
    "dateReserved": "2023-11-02T13:35:35.153Z",
    "dateUpdated": "2024-11-19T19:00:32.296Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20814 (GCVE-0-2023-20814)
Vulnerability from cvelistv5
Published
2023-08-07 03:22
Modified
2024-10-22 14:43
CWE
  • Elevation of Privilege
Summary
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453560; Issue ID: ALPS07453560.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.135Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20814",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T14:43:30.466609Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T14:43:40.468Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453560; Issue ID: ALPS07453560."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:22:07.288Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20814",
    "datePublished": "2023-08-07T03:22:07.288Z",
    "dateReserved": "2022-10-28T02:03:23.672Z",
    "dateUpdated": "2024-10-22T14:43:40.468Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32843 (GCVE-0-2023-32843)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2025-05-29 13:58
CWE
  • Denial of Service
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130204; Issue ID: MOLY01130204 (MSV-849).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.547Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32843",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-29T13:57:14.708137Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-617",
                "description": "CWE-617 Reachable Assertion",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-29T13:58:33.865Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, and NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130204; Issue ID: MOLY01130204 (MSV-849)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:02.107Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32843",
    "datePublished": "2023-12-04T03:46:02.107Z",
    "dateReserved": "2023-05-16T03:04:32.153Z",
    "dateUpdated": "2025-05-29T13:58:33.865Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20131 (GCVE-0-2024-20131)
Vulnerability from cvelistv5
Published
2024-12-02 03:07
Modified
2024-12-03 04:55
CWE
Summary
In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1873.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2737",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6813",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6815",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6899",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980d",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6986",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6986d",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6988:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6988",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6991",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8795t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20131",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-02T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-03T04:55:28.022Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT2739, MT6789, MT6813, MT6815, MT6835, MT6835T, MT6855, MT6878, MT6878T, MT6879, MT6886, MT6895, MT6895T, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6985, MT6986, MT6986D, MT6988, MT6989, MT6990, MT6991, MT8673, MT8676, MT8795T, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR16, NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1873."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-02T03:07:01.838Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20131",
    "datePublished": "2024-12-02T03:07:01.838Z",
    "dateReserved": "2023-11-02T13:35:35.181Z",
    "dateUpdated": "2024-12-03T04:55:28.022Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20754 (GCVE-0-2023-20754)
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 17:20
Severity ?
CWE
  • Elevation of Privilege
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07588343.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.000Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20754",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T17:20:28.578341Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T17:20:42.540Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07588343."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:44:02.816Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20754",
    "datePublished": "2023-07-04T01:44:02.816Z",
    "dateReserved": "2022-10-28T02:03:10.771Z",
    "dateUpdated": "2024-12-04T17:20:42.540Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20755 (GCVE-0-2023-20755)
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 17:21
Severity ?
CWE
  • Elevation of Privilege
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07509605.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.984Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20755",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T17:20:57.998358Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T17:21:10.822Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07509605."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:44:05.320Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20755",
    "datePublished": "2023-07-04T01:44:05.320Z",
    "dateReserved": "2022-10-28T02:03:10.771Z",
    "dateUpdated": "2024-12-04T17:21:10.822Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32806 (GCVE-0-2023-32806)
Vulnerability from cvelistv5
Published
2023-09-04 02:28
Modified
2024-10-21 17:56
CWE
  • Elevation of Privilege
Summary
In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441589; Issue ID: ALPS07441589.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.061Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8791t:*:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Android 12.0"
              },
              {
                "status": "affected",
                "version": "Android 13.0"
              },
              {
                "status": "affected",
                "version": "OpenWrt 21.02"
              },
              {
                "status": "affected",
                "version": "Yocto 4.0"
              },
              {
                "status": "affected",
                "version": "IOT-v23.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32806",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T17:15:35.648906Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T17:56:57.803Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6781, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT6990, MT8168, MT8365, MT8673, MT8766, MT8768, MT8781, MT8786, MT8789, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 21.02 / Yocto 4.0 / IOT-v23.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441589; Issue ID: ALPS07441589."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:28:10.594Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32806",
    "datePublished": "2023-09-04T02:28:10.594Z",
    "dateReserved": "2023-05-16T03:04:32.145Z",
    "dateUpdated": "2024-10-21T17:56:57.803Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20127 (GCVE-0-2024-20127)
Vulnerability from cvelistv5
Published
2024-12-02 03:06
Modified
2024-12-02 17:02
CWE
Summary
In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2023.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766r:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766r",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788e",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8863t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8863t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20127",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-02T17:02:20.784033Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-02T17:02:27.107Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8321, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8797, MT8798, MT8863T",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2023."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-02T03:06:58.549Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20127",
    "datePublished": "2024-12-02T03:06:58.549Z",
    "dateReserved": "2023-11-02T13:35:35.180Z",
    "dateUpdated": "2024-12-02T17:02:27.107Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20128 (GCVE-0-2024-20128)
Vulnerability from cvelistv5
Published
2024-12-02 03:06
Modified
2024-12-02 17:00
CWE
Summary
In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2024.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766r:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766r",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788e",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8863t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8863t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20128",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-02T17:00:33.324511Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-02T17:00:56.869Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8321, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8797, MT8798, MT8863T",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2024."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-02T03:06:56.942Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20128",
    "datePublished": "2024-12-02T03:06:56.942Z",
    "dateReserved": "2023-11-02T13:35:35.180Z",
    "dateUpdated": "2024-12-02T17:00:56.869Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20750 (GCVE-0-2023-20750)
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-07 19:07
CWE
  • Information Disclosure
Summary
In swpm, there is a possible out of bounds write due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780928.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.954Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.1,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20750",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-07T19:07:42.652304Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-362",
                "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-07T19:07:56.663Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6835, MT6886, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8175, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In swpm, there is a possible out of bounds write due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780928."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-06T12:11:49.210Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20750",
    "datePublished": "2023-06-06T12:11:49.210Z",
    "dateReserved": "2022-10-28T02:03:10.770Z",
    "dateUpdated": "2025-01-07T19:07:56.663Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20636 (GCVE-0-2025-20636)
Vulnerability from cvelistv5
Published
2025-02-03 03:23
Modified
2025-03-19 17:39
CWE
Summary
In secmem, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09403554; Issue ID: MSV-2431.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20636",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-03T16:21:27.439154Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-19T17:39:12.068Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8321, MT8385, MT8666, MT8667, MT8673, MT8755, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8795T, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In secmem, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09403554; Issue ID: MSV-2431."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-03T03:23:52.918Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20636",
    "datePublished": "2025-02-03T03:23:52.918Z",
    "dateReserved": "2024-11-01T01:21:50.363Z",
    "dateUpdated": "2025-03-19T17:39:12.068Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32845 (GCVE-0-2023-32845)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-28 19:32
Severity ?
CWE
  • Denial of Service
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01139296 (MSV-860).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:45.095Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2735",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2737",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6297",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6298",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6813",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6815",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875t",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895t",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980d",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "modem_nr15_nr16_nr17"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32845",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-28T18:53:53.230062Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T19:32:20.281Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, and NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01139296 (MSV-860)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:04.973Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32845",
    "datePublished": "2023-12-04T03:46:04.973Z",
    "dateReserved": "2023-05-16T03:04:32.154Z",
    "dateUpdated": "2024-08-28T19:32:20.281Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20833 (GCVE-0-2023-20833)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-28 01:35
CWE
  • Information Disclosure
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017764.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.207Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20833",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T14:08:35.400557Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-862",
                "description": "CWE-862 Missing Authorization",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-28T01:35:33.140Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017764."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:37.358Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20833",
    "datePublished": "2023-09-04T02:27:37.358Z",
    "dateReserved": "2022-10-28T02:03:23.685Z",
    "dateUpdated": "2024-10-28T01:35:33.140Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32864 (GCVE-0-2023-32864)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-02 15:32
Severity ?
CWE
  • Elevation of Privilege
Summary
In display drm, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292187; Issue ID: ALPS07292187.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.555Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8168, MT8195, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display drm, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292187; Issue ID: ALPS07292187."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:15.342Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32864",
    "datePublished": "2023-12-04T03:46:15.342Z",
    "dateReserved": "2023-05-16T03:04:32.161Z",
    "dateUpdated": "2024-08-02T15:32:46.555Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20725 (GCVE-0-2023-20725)
Vulnerability from cvelistv5
Published
2023-06-06 12:12
Modified
2025-01-07 20:13
CWE
  • Elevation of Privilege
Summary
In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only); Issue ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.965Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20725",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-07T20:12:10.519743Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-07T20:13:21.695Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8175, MT8195, MT8365, MT8385, MT8673, MT8781, MT8788, MT8789",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 19.07, 21.02 / RDK-B 2022Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only); Issue ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-06T12:12:12.278Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20725",
    "datePublished": "2023-06-06T12:12:12.278Z",
    "dateReserved": "2022-10-28T02:03:10.766Z",
    "dateUpdated": "2025-01-07T20:13:21.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20818 (GCVE-0-2023-20818)
Vulnerability from cvelistv5
Published
2023-08-07 03:22
Modified
2024-10-22 19:37
CWE
  • Information Disclosure
Summary
In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460540; Issue ID: ALPS07460540.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.179Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20818",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T14:25:36.384727Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T19:37:35.428Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460540; Issue ID: ALPS07460540."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:22:16.379Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20818",
    "datePublished": "2023-08-07T03:22:16.379Z",
    "dateReserved": "2022-10-28T02:03:23.673Z",
    "dateUpdated": "2024-10-22T19:37:35.428Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20045 (GCVE-0-2024-20045)
Vulnerability from cvelistv5
Published
2024-04-01 02:35
Modified
2025-03-28 19:16
CWE
  • Information Disclosure
Summary
In audio, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08024748; Issue ID: ALPS08029526.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 2.3,
              "baseSeverity": "LOW",
              "confidentialityImpact": "LOW",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20045",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-02T15:34:24.247800Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-28T19:16:33.512Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6983, MT6985, MT6989, MT8167, MT8167S, MT8168, MT8188, MT8195, MT8321, MT8385, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In audio, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08024748; Issue ID: ALPS08029526."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-01T02:35:04.246Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20045",
    "datePublished": "2024-04-01T02:35:04.246Z",
    "dateReserved": "2023-11-02T13:35:35.157Z",
    "dateUpdated": "2025-03-28T19:16:33.512Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32883 (GCVE-0-2023-32883)
Vulnerability from cvelistv5
Published
2024-01-02 02:49
Modified
2025-06-03 14:46
CWE
  • Elevation of Privilege
Summary
In Engineer Mode, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08282249; Issue ID: ALPS08282249.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.477Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32883",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-08T17:31:16.304833Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T14:46:48.134Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Engineer Mode, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08282249; Issue ID: ALPS08282249."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:49:54.424Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32883",
    "datePublished": "2024-01-02T02:49:54.424Z",
    "dateReserved": "2023-05-16T03:04:32.173Z",
    "dateUpdated": "2025-06-03T14:46:48.134Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20678 (GCVE-0-2025-20678)
Vulnerability from cvelistv5
Published
2025-06-02 02:29
Modified
2025-06-02 15:46
CWE
Summary
In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20678",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-02T15:21:06.886934Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-02T15:46:17.386Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, LR13, NR15, NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-674",
              "description": "CWE-674 Uncontrolled Recursion",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-02T02:29:47.843Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20678",
    "datePublished": "2025-06-02T02:29:47.843Z",
    "dateReserved": "2024-11-01T01:21:50.371Z",
    "dateUpdated": "2025-06-02T15:46:17.386Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32827 (GCVE-0-2023-32827)
Vulnerability from cvelistv5
Published
2023-10-02 02:05
Modified
2024-09-21 15:23
CWE
  • Elevation of Privilege
Summary
In camera middleware, there is a possible out of bounds write due to a missing input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993539; Issue ID: ALPS07993539.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.067Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8173",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8185",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8395",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8675",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32827",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-21T15:22:10.766198Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          },
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-21T15:23:18.113Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6879, MT6886, MT6895, MT6983, MT6985, MT6989, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In camera middleware, there is a possible out of bounds write due to a missing input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993539; Issue ID: ALPS07993539."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-02T02:05:38.331Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/October-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32827",
    "datePublished": "2023-10-02T02:05:38.331Z",
    "dateReserved": "2023-05-16T03:04:32.150Z",
    "dateUpdated": "2024-09-21T15:23:18.113Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20645 (GCVE-0-2025-20645)
Vulnerability from cvelistv5
Published
2025-03-03 02:25
Modified
2025-03-06 04:55
CWE
Summary
In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09475476; Issue ID: MSV-2599.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20645",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-05T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-06T04:55:15.322Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6765, MT6768, MT6833, MT6835, MT6853, MT6855, MT6879, MT6886, MT6893, MT6897, MT6983, MT6985, MT6989, MT8796",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09475476; Issue ID: MSV-2599."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-03T02:25:29.510Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20645",
    "datePublished": "2025-03-03T02:25:29.510Z",
    "dateReserved": "2024-11-01T01:21:50.365Z",
    "dateUpdated": "2025-03-06T04:55:15.322Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20726 (GCVE-0-2023-20726)
Vulnerability from cvelistv5
Published
2023-05-15 00:00
Modified
2025-01-24 15:01
CWE
  • Information Disclosure
Summary
In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only); Issue ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 3.3,
              "baseSeverity": "LOW",
              "confidentialityImpact": "LOW",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20726",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-24T15:00:15.127141Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-862",
                "description": "CWE-862 Missing Authorization",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-24T15:01:08.247Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2731, MT2735, MT2737, MT6580, MT6739, MT6761, MT6762, MT6765, MT6767, MT6768, MT6769, MT6771, MT6779, MT6781, MT6783, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6980, MT6980D, MT6983, MT6985, MT6990, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0 / OpenWrt 19.07, 21.02 / Yocto 2.6, 3.3 / RDKB 2022Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only); Issue ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-15T00:00:00.000Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20726",
    "datePublished": "2023-05-15T00:00:00.000Z",
    "dateReserved": "2022-10-28T00:00:00.000Z",
    "dateUpdated": "2025-01-24T15:01:08.247Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20039 (GCVE-0-2024-20039)
Vulnerability from cvelistv5
Published
2024-04-01 02:34
Modified
2024-08-01 21:52
CWE
  • Remote Code Execution
Summary
In modem protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01240012; Issue ID: MSV-1215.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "lr12a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThan": "moly01240012",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "lr13",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThan": "moly01240012",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr15",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThan": "moly01240012",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr16",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThan": "moly01240012",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr17",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThan": "moly01240012",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20039",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-01T17:50:38.500889Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-01T14:27:16.305Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.735Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2731, MT2735, MT2737, MT3967, MT6297, MT6298, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6986, MT6986D, MT6989, MT6990, MT8666, MT8667, MT8673, MT8675, MT8676, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8791, MT8791T, MT8792, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, LR13, NR15, NR16, NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In modem protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01240012; Issue ID: MSV-1215."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Remote Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-01T02:34:49.330Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20039",
    "datePublished": "2024-04-01T02:34:49.330Z",
    "dateReserved": "2023-11-02T13:35:35.153Z",
    "dateUpdated": "2024-08-01T21:52:31.735Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20829 (GCVE-0-2023-20829)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-10 15:24
CWE
  • Elevation of Privilege
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014148.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.081Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2735",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20829",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T15:23:10.688755Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-10T15:24:13.653Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8168, MT8175, MT8362A, MT8365",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014148."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:30.694Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20829",
    "datePublished": "2023-09-04T02:27:30.694Z",
    "dateReserved": "2022-10-28T02:03:23.684Z",
    "dateUpdated": "2024-10-10T15:24:13.653Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20774 (GCVE-0-2023-20774)
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 16:21
Severity ?
CWE
  • Elevation of Privilege
Summary
In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292228; Issue ID: ALPS07292228.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.095Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20774",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T16:21:43.941249Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T16:21:59.663Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6789, MT6835, MT6855, MT6886, MT6895, MT6983, MT6985, MT8195, MT8673, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292228; Issue ID: ALPS07292228."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:44:41.321Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20774",
    "datePublished": "2023-07-04T01:44:41.321Z",
    "dateReserved": "2022-10-28T02:03:10.774Z",
    "dateUpdated": "2024-12-04T16:21:59.663Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20010 (GCVE-0-2024-20010)
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2025-04-17 15:33
CWE
  • Elevation of Privilege
Summary
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358560; Issue ID: ALPS08358560.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.714Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20010",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-17T15:32:38.690465Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-843",
                "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-17T15:33:06.702Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358560; Issue ID: ALPS08358560."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-05T05:59:30.948Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20010",
    "datePublished": "2024-02-05T05:59:30.948Z",
    "dateReserved": "2023-11-02T13:35:35.148Z",
    "dateUpdated": "2025-04-17T15:33:06.702Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32862 (GCVE-0-2023-32862)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-02 15:32
Severity ?
CWE
  • Elevation of Privilege
Summary
In display, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07388762; Issue ID: ALPS07388762.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8168, MT8188, MT8195, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07388762; Issue ID: ALPS07388762."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:12.396Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32862",
    "datePublished": "2023-12-04T03:46:12.396Z",
    "dateReserved": "2023-05-16T03:04:32.161Z",
    "dateUpdated": "2024-08-02T15:32:46.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20665 (GCVE-0-2025-20665)
Vulnerability from cvelistv5
Published
2025-05-05 02:49
Modified
2025-05-12 17:58
CWE
  • CWE-538 - File and Directory Information Exposure
Summary
In devinfo, there is a possible information disclosure due to a missing SELinux policy. This could lead to local information disclosure of device identifier with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09555228; Issue ID: MSV-2760.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20665",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-12T17:57:56.935917Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-12T17:58:17.519Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8175, MT8195, MT8196, MT8321, MT8365, MT8370, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8796, MT8797, MT8798, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In devinfo, there is a possible information disclosure due to a missing SELinux policy. This could lead to local information disclosure of device identifier with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09555228; Issue ID: MSV-2760."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-538",
              "description": "CWE-538 File and Directory Information Exposure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-05T02:49:18.459Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20665",
    "datePublished": "2025-05-05T02:49:18.459Z",
    "dateReserved": "2024-11-01T01:21:50.368Z",
    "dateUpdated": "2025-05-12T17:58:17.519Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32891 (GCVE-0-2023-32891)
Vulnerability from cvelistv5
Published
2024-01-02 02:50
Modified
2025-06-18 15:03
CWE
  • Elevation of Privilege
Summary
In bluetooth service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07933038; Issue ID: MSV-559.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.477Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32891",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-02T15:12:59.280070Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-18T15:03:58.976Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6739, MT6761, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6983, MT6985, MT6989, MT8167, MT8167S, MT8173, MT8175, MT8188, MT8195, MT8321, MT8365, MT8370, MT8385, MT8390, MT8395, MT8765, MT8766, MT8768, MT8786, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In bluetooth service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07933038; Issue ID: MSV-559."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:50:11.129Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32891",
    "datePublished": "2024-01-02T02:50:11.129Z",
    "dateReserved": "2023-05-16T03:04:32.175Z",
    "dateUpdated": "2025-06-18T15:03:58.976Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20824 (GCVE-0-2023-20824)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-10 15:38
Severity ?
CWE
  • Information Disclosure
Summary
In duraspeed, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07951402; Issue ID: ALPS07951402.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.052Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20824",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T15:38:43.283177Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-10T15:38:54.413Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6580, MT6735, MT6739, MT6761, MT6762, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8168, MT8175, MT8188, MT8195, MT8321, MT8365, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In duraspeed, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07951402; Issue ID: ALPS07951402."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:22.373Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20824",
    "datePublished": "2023-09-04T02:27:22.373Z",
    "dateReserved": "2022-10-28T02:03:23.679Z",
    "dateUpdated": "2024-10-10T15:38:54.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20781 (GCVE-0-2023-20781)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:40
Severity ?
CWE
  • Denial of Service
Summary
In keyinstall, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS07905323.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.208Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20781",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:40:07.455816Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:40:21.172Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS07905323."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:02.665Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20781",
    "datePublished": "2023-08-07T03:21:02.665Z",
    "dateReserved": "2022-10-28T02:03:10.776Z",
    "dateUpdated": "2024-10-17T14:40:21.172Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20007 (GCVE-0-2024-20007)
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2025-05-15 19:47
CWE
  • Elevation of Privilege
Summary
In mp3 decoder, there is a possible out of bounds write due to a race condition. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08441369; Issue ID: ALPS08441369.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.516Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20007",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-08T17:30:25.264440Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-362",
                "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-15T19:47:50.386Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6779, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6895, MT6983, MT6985, MT8321, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In mp3 decoder, there is a possible out of bounds write due to a race condition. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08441369; Issue ID: ALPS08441369."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-05T05:59:28.064Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20007",
    "datePublished": "2024-02-05T05:59:28.064Z",
    "dateReserved": "2023-11-02T13:35:35.147Z",
    "dateUpdated": "2025-05-15T19:47:50.386Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20780 (GCVE-0-2023-20780)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:41
Severity ?
CWE
  • Information Disclosure
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017756.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.005Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20780",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:41:07.970344Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:41:18.229Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017756."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:00.627Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20780",
    "datePublished": "2023-08-07T03:21:00.627Z",
    "dateReserved": "2022-10-28T02:03:10.776Z",
    "dateUpdated": "2024-10-17T14:41:18.229Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20079 (GCVE-0-2024-20079)
Vulnerability from cvelistv5
Published
2024-07-01 03:18
Modified
2025-03-13 14:29
Severity ?
CWE
Summary
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: MSV-1491.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "14.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20079",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-01T14:04:31.803925Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-13T14:29:43.879Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.663Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT6989, MT8666, MT8667, MT8673, MT8676, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: MSV-1491."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-01T03:18:06.522Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20079",
    "datePublished": "2024-07-01T03:18:06.522Z",
    "dateReserved": "2023-11-02T13:35:35.172Z",
    "dateUpdated": "2025-03-13T14:29:43.879Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20790 (GCVE-0-2023-20790)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:35
Severity ?
CWE
  • Information Disclosure
Summary
In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07740194; Issue ID: ALPS07740194.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.989Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20790",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:35:07.250648Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:35:32.306Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2735, MT2737, MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 19.07, 21.02 / RDK-B 22Q3 / Yocto 2.6, 3.3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07740194; Issue ID: ALPS07740194."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:22.382Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20790",
    "datePublished": "2023-08-07T03:21:22.382Z",
    "dateReserved": "2022-10-28T02:03:10.778Z",
    "dateUpdated": "2024-10-17T14:35:32.306Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20024 (GCVE-0-2024-20024)
Vulnerability from cvelistv5
Published
2024-03-04 02:43
Modified
2024-08-01 21:52
CWE
  • Elevation of Privilege
Summary
In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541635; Issue ID: ALPS08541635.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8666b:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666b",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "android_12.0"
              },
              {
                "status": "affected",
                "version": "android_13.0"
              },
              {
                "status": "affected",
                "version": "android_14.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 6,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20024",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-08T05:00:27.610219Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-27T20:41:14.123Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.575Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6781, MT6789, MT6833, MT6835, MT6879, MT6886, MT6895, MT6983, MT6985, MT6989, MT8666, MT8666A, MT8666B, MT8667, MT8673, MT8676, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541635; Issue ID: ALPS08541635."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-04T02:43:34.025Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20024",
    "datePublished": "2024-03-04T02:43:34.025Z",
    "dateReserved": "2023-11-02T13:35:35.151Z",
    "dateUpdated": "2024-08-01T21:52:31.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32874 (GCVE-0-2023-32874)
Vulnerability from cvelistv5
Published
2024-01-02 02:49
Modified
2025-04-17 18:53
Severity ?
CWE
  • Remote Code Execution
Summary
In Modem IMS Stack, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161803; Issue ID: MOLY01161803 (MSV-893).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.706Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32874",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-09T05:00:41.266721Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-17T18:53:25.930Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR13 NR15, NR16, and NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem IMS Stack, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161803; Issue ID: MOLY01161803 (MSV-893)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Remote Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:49:38.153Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32874",
    "datePublished": "2024-01-02T02:49:38.153Z",
    "dateReserved": "2023-05-16T03:04:32.171Z",
    "dateUpdated": "2025-04-17T18:53:25.930Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20136 (GCVE-0-2024-20136)
Vulnerability from cvelistv5
Published
2024-12-02 03:07
Modified
2024-12-02 15:49
CWE
Summary
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09121847; Issue ID: MSV-1821.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2737",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6878",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6897",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8195",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8370",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8678",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8755",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8775",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8795t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 6.2,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20136",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-02T15:48:57.414776Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-02T15:49:02.279Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6781, MT6789, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8195, MT8370, MT8390, MT8673, MT8676, MT8678, MT8755, MT8775, MT8781, MT8795T, MT8796, MT8798, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0 / openWRT 19.07, 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09121847; Issue ID: MSV-1821."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-02T03:07:09.915Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20136",
    "datePublished": "2024-12-02T03:07:09.915Z",
    "dateReserved": "2023-11-02T13:35:35.182Z",
    "dateUpdated": "2024-12-02T15:49:02.279Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32834 (GCVE-0-2023-32834)
Vulnerability from cvelistv5
Published
2023-11-06 03:50
Modified
2025-04-29 20:13
CWE
  • Elevation of Privilege
Summary
In secmem, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08161762; Issue ID: ALPS08161762.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.099Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32834",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-23T13:25:52.586250Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-843",
                "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-29T20:13:08.123Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In secmem, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08161762; Issue ID: ALPS08161762."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-06T03:50:45.515Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32834",
    "datePublished": "2023-11-06T03:50:45.515Z",
    "dateReserved": "2023-05-16T03:04:32.152Z",
    "dateUpdated": "2025-04-29T20:13:08.123Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32870 (GCVE-0-2023-32870)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-02 15:32
Severity ?
CWE
  • Elevation of Privilege
Summary
In display drm, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363740; Issue ID: ALPS07363740.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.624Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8168, MT8183, MT8188, MT8195, MT8673, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display drm, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363740; Issue ID: ALPS07363740."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:24.161Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32870",
    "datePublished": "2023-12-04T03:46:24.161Z",
    "dateReserved": "2023-05-16T03:04:32.163Z",
    "dateUpdated": "2024-08-02T15:32:46.624Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32888 (GCVE-0-2023-32888)
Vulnerability from cvelistv5
Published
2024-01-02 02:50
Modified
2025-05-16 17:38
CWE
  • Denial of Service
Summary
In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161830; Issue ID: MOLY01161830 (MSV-894).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.489Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32888",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-11T19:12:39.907697Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-16T17:38:33.524Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, and NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161830; Issue ID: MOLY01161830 (MSV-894)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:50:03.942Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32888",
    "datePublished": "2024-01-02T02:50:03.942Z",
    "dateReserved": "2023-05-16T03:04:32.174Z",
    "dateUpdated": "2025-05-16T17:38:33.524Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20059 (GCVE-0-2024-20059)
Vulnerability from cvelistv5
Published
2024-05-06 02:51
Modified
2025-03-19 13:48
CWE
  • CWE-1332 - Improper Handling of Faults that Lead to Instruction Skips
Summary
In da, there is a possible escalation of privilege due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541749; Issue ID: ALPS08541749.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:mediatek:mt6768:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20059",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-09T20:12:52.079441Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-19T13:48:02.607Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT6989, MT8188, MT8370, MT8390",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In da, there is a possible escalation of privilege due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541749; Issue ID: ALPS08541749."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1332",
              "description": "CWE-1332 Improper Handling of Faults that Lead to Instruction Skips",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-06T02:51:55.410Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20059",
    "datePublished": "2024-05-06T02:51:55.410Z",
    "dateReserved": "2023-11-02T13:35:35.162Z",
    "dateUpdated": "2025-03-19T13:48:02.607Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32835 (GCVE-0-2023-32835)
Vulnerability from cvelistv5
Published
2023-11-06 03:50
Modified
2025-04-24 15:47
CWE
  • Elevation of Privilege
Summary
In keyinstall, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08157918; Issue ID: ALPS08157918.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:37.189Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32835",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-23T13:25:50.681245Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-843",
                "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-24T15:47:50.374Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyinstall, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08157918; Issue ID: ALPS08157918."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-06T03:50:47.125Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32835",
    "datePublished": "2023-11-06T03:50:47.125Z",
    "dateReserved": "2023-05-16T03:04:32.152Z",
    "dateUpdated": "2025-04-24T15:47:50.374Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20749 (GCVE-0-2023-20749)
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-07 19:09
CWE
  • Elevation of Privilege
Summary
In swpm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780926.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.931Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20749",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-07T19:09:45.150222Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-07T19:09:50.168Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6789, MT6835, MT6855, MT6879, MT6886, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8175, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In swpm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780926."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-06T12:11:47.207Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20749",
    "datePublished": "2023-06-06T12:11:47.207Z",
    "dateReserved": "2022-10-28T02:03:10.770Z",
    "dateUpdated": "2025-01-07T19:09:50.168Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20775 (GCVE-0-2023-20775)
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 16:23
Severity ?
CWE
  • Elevation of Privilege
Summary
In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.088Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20775",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T16:22:40.243485Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T16:23:07.238Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6983, MT6985, MT6990, MT8168, MT8183, MT8195, MT8673, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 21.02 / RDKB 2022Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:44:43.844Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20775",
    "datePublished": "2023-07-04T01:44:43.844Z",
    "dateReserved": "2022-10-28T02:03:10.775Z",
    "dateUpdated": "2024-12-04T16:23:07.238Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20013 (GCVE-0-2024-20013)
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2025-06-20 20:09
CWE
  • Elevation of Privilege
Summary
In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08471742; Issue ID: ALPS08308608.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.685Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20013",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-13T05:00:43.278594Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-20T20:09:28.305Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08471742; Issue ID: ALPS08308608."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-05T05:59:36.678Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20013",
    "datePublished": "2024-02-05T05:59:36.678Z",
    "dateReserved": "2023-11-02T13:35:35.150Z",
    "dateUpdated": "2025-06-20T20:09:28.305Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32884 (GCVE-0-2023-32884)
Vulnerability from cvelistv5
Published
2024-01-02 02:49
Modified
2025-06-03 14:46
CWE
  • Information Disclosure
Summary
In netdagent, there is a possible information disclosure due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07944011; Issue ID: ALPS07944011.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32884",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-08T17:31:12.737022Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-119",
                "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T14:46:42.267Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8188, MT8192, MT8195, MT8195Z, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8696, MT8755, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8871",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In netdagent, there is a possible information disclosure due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07944011; Issue ID: ALPS07944011."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-02T02:49:56.354Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32884",
    "datePublished": "2024-01-02T02:49:56.354Z",
    "dateReserved": "2023-05-16T03:04:32.173Z",
    "dateUpdated": "2025-06-03T14:46:42.267Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32858 (GCVE-0-2023-32858)
Vulnerability from cvelistv5
Published
2023-12-04 03:45
Modified
2024-08-02 15:32
Severity ?
CWE
  • Information Disclosure
Summary
In GZ, there is a possible information disclosure due to a missing data erasing. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07806008; Issue ID: ALPS07806008.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.834Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6765, MT6771, MT6835, MT6886, MT6983, MT6985, MT8766, MT8768, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In GZ, there is a possible information disclosure due to a missing data erasing. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07806008; Issue ID: ALPS07806008."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:45:57.818Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32858",
    "datePublished": "2023-12-04T03:45:57.818Z",
    "dateReserved": "2023-05-16T03:04:32.159Z",
    "dateUpdated": "2024-08-02T15:32:46.834Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32854 (GCVE-0-2023-32854)
Vulnerability from cvelistv5
Published
2023-12-04 03:45
Modified
2025-05-29 14:00
CWE
  • Elevation of Privilege
Summary
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08240132; Issue ID: ALPS08240132.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.674Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32854",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-29T13:59:31.074104Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-29T14:00:08.867Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6835, MT6879, MT6886, MT6895, MT6983, MT6985, MT8321, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08240132; Issue ID: ALPS08240132."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:45:52.054Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32854",
    "datePublished": "2023-12-04T03:45:52.054Z",
    "dateReserved": "2023-05-16T03:04:32.158Z",
    "dateUpdated": "2025-05-29T14:00:08.867Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20813 (GCVE-0-2023-20813)
Vulnerability from cvelistv5
Published
2023-08-07 03:22
Modified
2024-10-28 01:33
CWE
  • Information Disclosure
Summary
In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453549; Issue ID: ALPS07453549.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.043Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20813",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:25:49.937674Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-28T01:33:03.090Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453549; Issue ID: ALPS07453549."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:22:05.223Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20813",
    "datePublished": "2023-08-07T03:22:05.223Z",
    "dateReserved": "2022-10-28T02:03:23.672Z",
    "dateUpdated": "2024-10-28T01:33:03.090Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20828 (GCVE-0-2023-20828)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-10 15:27
CWE
  • Elevation of Privilege
Summary
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014144.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.209Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2735",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8167s",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8168",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8175",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8362a",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20828",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T15:26:39.819791Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-10T15:27:54.747Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8168, MT8175, MT8362A, MT8365",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014144."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:29.062Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20828",
    "datePublished": "2023-09-04T02:27:29.062Z",
    "dateReserved": "2022-10-28T02:03:23.684Z",
    "dateUpdated": "2024-10-10T15:27:54.747Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20132 (GCVE-0-2024-20132)
Vulnerability from cvelistv5
Published
2024-12-02 03:07
Modified
2024-12-03 04:55
CWE
Summary
In Modem, there is a possible out of bonds write due to a mission bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00957388; Issue ID: MSV-1872.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2737",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6298",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6896",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980d",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8676",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8795t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20132",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-02T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-03T04:55:29.222Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6298, MT6879, MT6886, MT6895, MT6895T, MT6896, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990, MT8673, MT8676, MT8795T, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR16 partial branches"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible out of bonds write due to a mission bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00957388; Issue ID: MSV-1872."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-02T03:07:03.438Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20132",
    "datePublished": "2024-12-02T03:07:03.438Z",
    "dateReserved": "2023-11-02T13:35:35.181Z",
    "dateUpdated": "2024-12-03T04:55:29.222Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32841 (GCVE-0-2023-32841)
Vulnerability from cvelistv5
Published
2023-12-04 03:45
Modified
2024-08-02 15:32
Severity ?
CWE
  • Denial of Service
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01128524 (MSV-846).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.440Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, and NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01128524 (MSV-846)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:45:59.231Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32841",
    "datePublished": "2023-12-04T03:45:59.231Z",
    "dateReserved": "2023-05-16T03:04:32.153Z",
    "dateUpdated": "2024-08-02T15:32:46.440Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20650 (GCVE-0-2025-20650)
Vulnerability from cvelistv5
Published
2025-03-03 02:25
Modified
2025-03-06 04:55
CWE
Summary
In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2061.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.8,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20650",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-05T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-06T04:55:18.157Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0 / openWRT 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2061."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-03T02:25:45.646Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20650",
    "datePublished": "2025-03-03T02:25:45.646Z",
    "dateReserved": "2024-11-01T01:21:50.366Z",
    "dateUpdated": "2025-03-06T04:55:18.157Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32844 (GCVE-0-2023-32844)
Vulnerability from cvelistv5
Published
2023-12-04 03:46
Modified
2024-08-02 15:32
Severity ?
CWE
  • Denial of Service
Summary
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01130183 (MSV-850).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:46.588Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, and NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01130183 (MSV-850)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:46:03.547Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32844",
    "datePublished": "2023-12-04T03:46:03.547Z",
    "dateReserved": "2023-05-16T03:04:32.153Z",
    "dateUpdated": "2024-08-02T15:32:46.588Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20121 (GCVE-0-2024-20121)
Vulnerability from cvelistv5
Published
2024-11-04 01:49
Modified
2024-11-04 10:18
CWE
Summary
In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1574.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8775",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8792",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8795t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              },
              {
                "status": "affected",
                "version": "14.0"
              },
              {
                "status": "affected",
                "version": "15.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20121",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-04T10:16:18.684979Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-04T10:18:08.164Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6765, MT6768, MT6833, MT6835, MT6853, MT6855, MT6879, MT6886, MT6893, MT6983, MT6989, MT8321, MT8385, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8792, MT8795T, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1574."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T01:49:36.169Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20121",
    "datePublished": "2024-11-04T01:49:36.169Z",
    "dateReserved": "2023-11-02T13:35:35.179Z",
    "dateUpdated": "2024-11-04T10:18:08.164Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20731 (GCVE-0-2023-20731)
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-08 14:59
CWE
  • Information Disclosure
Summary
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573495; Issue ID: ALPS07573495.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.963Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20731",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-08T14:59:39.633328Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-08T14:59:48.975Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT7663, MT7668, MT7902, MT7921, MT8167, MT8167S, MT8173, MT8175, MT8195, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8666, MT8695, MT8781, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / Yocto 3.1,3.3,4.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573495; Issue ID: ALPS07573495."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-06T12:11:13.200Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20731",
    "datePublished": "2023-06-06T12:11:13.200Z",
    "dateReserved": "2022-10-28T02:03:10.767Z",
    "dateUpdated": "2025-01-08T14:59:48.975Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20827 (GCVE-0-2023-20827)
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-10 15:35
CWE
  • Elevation of Privilege
Summary
In ims service, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937105; Issue ID: ALPS07937105.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.051Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6763",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6771",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6891",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "12.0"
              },
              {
                "status": "affected",
                "version": "13.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20827",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T15:28:26.685230Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-1298",
                "description": "CWE-1298 Hardware Logic Contains Race Conditions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-10T15:35:56.544Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6762, MT6763, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8673, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ims service, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937105; Issue ID: ALPS07937105."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:27.371Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20827",
    "datePublished": "2023-09-04T02:27:27.371Z",
    "dateReserved": "2022-10-28T02:03:23.684Z",
    "dateUpdated": "2024-10-10T15:35:56.544Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-32812 (GCVE-0-2023-32812)
Vulnerability from cvelistv5
Published
2023-09-04 02:28
Modified
2024-10-21 18:03
CWE
  • Elevation of Privilege
Summary
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local esclation of privileges with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017365; Issue ID: ALPS08017365.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.993Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6883:*:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8365",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "Android 13.0"
              },
              {
                "status": "affected",
                "version": "OpenWrt 1907"
              },
              {
                "status": "affected",
                "version": "OpenWrt 2102"
              },
              {
                "status": "affected",
                "version": "Yocto 2.6"
              },
              {
                "status": "affected",
                "version": "RDK-B 22Q3"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-32812",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T17:15:34.549974Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T18:03:30.573Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT2735, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6895, MT6980, MT6983, MT6985, MT6990, MT8168, MT8175, MT8188, MT8195, MT8365",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local esclation of privileges with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017365; Issue ID: ALPS08017365."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:28:20.521Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32812",
    "datePublished": "2023-09-04T02:28:20.521Z",
    "dateReserved": "2023-05-16T03:04:32.146Z",
    "dateUpdated": "2024-10-21T18:03:30.573Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20658 (GCVE-0-2025-20658)
Vulnerability from cvelistv5
Published
2025-04-07 03:14
Modified
2025-04-07 18:22
CWE
Summary
In DA, there is a possible permission bypass due to a logic error. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09474894; Issue ID: MSV-2597.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "LOW",
              "baseScore": 6,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20658",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T14:19:21.779349Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T18:22:01.666Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2718, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6886, MT6895, MT6897, MT6983, MT6985, MT6989, MT8196, MT8673, MT8676, MT8678, MT8781",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In DA, there is a possible permission bypass due to a logic error. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09474894; Issue ID: MSV-2597."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-07T03:14:52.452Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20658",
    "datePublished": "2025-04-07T03:14:52.452Z",
    "dateReserved": "2024-11-01T01:21:50.367Z",
    "dateUpdated": "2025-04-07T18:22:01.666Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20695 (GCVE-0-2023-20695)
Vulnerability from cvelistv5
Published
2023-05-15 00:00
Modified
2025-01-23 21:30
CWE
  • Elevation of Privilege
Summary
In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only); Issue ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only).
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.398Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20695",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-23T21:30:12.568668Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-23T21:30:47.770Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6835, MT6880, MT6886, MT6890, MT6980, MT6985, MT6990, MT8167, MT8175, MT8185, MT8195, MT8321, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0 / OpenWrt 19.07, 21.02"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only); Issue ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-15T00:00:00.000Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20695",
    "datePublished": "2023-05-15T00:00:00.000Z",
    "dateReserved": "2022-10-28T00:00:00.000Z",
    "dateUpdated": "2025-01-23T21:30:47.770Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20032 (GCVE-0-2024-20032)
Vulnerability from cvelistv5
Published
2024-03-04 02:43
Modified
2024-08-23 19:00
CWE
  • Elevation of Privilege
Summary
In aee, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08487630; Issue ID: MSV-1020.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.518Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6779",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6785",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8792",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20032",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-23T18:56:37.912431Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-862",
                "description": "CWE-862 Missing Authorization",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-23T19:00:27.547Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT6989, MT8321, MT8673, MT8765, MT8766, MT8768, MT8781, MT8789, MT8791, MT8792, MT8796",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08487630; Issue ID: MSV-1020."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-04T02:43:46.798Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20032",
    "datePublished": "2024-03-04T02:43:46.798Z",
    "dateReserved": "2023-11-02T13:35:35.152Z",
    "dateUpdated": "2024-08-23T19:00:27.547Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20739 (GCVE-0-2023-20739)
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-07 21:11
CWE
  • Elevation of Privilege
Summary
In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559819.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.971Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20739",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-07T21:11:45.498448Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-07T21:11:50.842Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8365, MT8395, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0 / Yocto 4.0 / Iot-Yocto 22.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559819."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-06T12:11:29.214Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20739",
    "datePublished": "2023-06-06T12:11:29.214Z",
    "dateReserved": "2022-10-28T02:03:10.767Z",
    "dateUpdated": "2025-01-07T21:11:50.842Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20798 (GCVE-0-2023-20798)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:31
Severity ?
CWE
  • Information Disclosure
Summary
In pda, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07147572; Issue ID: ALPS07421076.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.989Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20798",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:30:56.120536Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:31:09.769Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2713, MT6855, MT6879, MT6886, MT6895, MT6983, MT6985, MT8188, MT8195, MT8395, MT8673",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In pda, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07147572; Issue ID: ALPS07421076."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-07T03:21:34.035Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20798",
    "datePublished": "2023-08-07T03:21:34.035Z",
    "dateReserved": "2022-10-28T02:03:10.781Z",
    "dateUpdated": "2024-10-17T14:31:09.769Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20702 (GCVE-0-2023-20702)
Vulnerability from cvelistv5
Published
2023-11-06 03:50
Modified
2024-09-05 15:17
CWE
  • Denial of Service
Summary
In 5G NRLC, there is a possible invalid memory access due to lack of error handling. This could lead to remote denial of service, if UE received invalid 1-byte rlc sdu, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00921261; Issue ID: MOLY01128895.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.992Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6873",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6875",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8675",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791t",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20702",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-05T15:16:26.867886Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-05T15:17:22.422Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6835, MT6873, MT6875, MT6879, MT6883, MT6885, MT6886, MT6889, MT6895, MT6980, MT6983, MT6985, MT6990, MT8673, MT8675, MT8791, MT8791T, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem NR15, NR16, NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In 5G NRLC, there is a possible invalid memory access due to lack of error handling. This could lead to remote denial of service, if UE received invalid 1-byte rlc sdu, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00921261; Issue ID: MOLY01128895."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-06T03:50:51.533Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20702",
    "datePublished": "2023-11-06T03:50:51.533Z",
    "dateReserved": "2022-10-28T02:03:10.759Z",
    "dateUpdated": "2024-09-05T15:17:22.422Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20767 (GCVE-0-2023-20767)
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 21:41
Severity ?
CWE
  • Elevation of Privilege
Summary
In pqframework, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629585; Issue ID: ALPS07629584.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:40.961Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20767",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T19:08:22.103128Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T21:41:17.672Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6879, MT6886, MT6895, MT6983, MT6985, MT8167, MT8168, MT8195, MT8673",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In pqframework, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629585; Issue ID: ALPS07629584."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-04T01:44:28.742Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20767",
    "datePublished": "2023-07-04T01:44:28.742Z",
    "dateReserved": "2022-10-28T02:03:10.773Z",
    "dateUpdated": "2024-12-04T21:41:17.672Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20085 (GCVE-0-2024-20085)
Vulnerability from cvelistv5
Published
2024-09-02 02:07
Modified
2024-10-27 02:38
CWE
Summary
In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944204; Issue ID: MSV-1560.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20085",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-03T14:22:28.999522Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-27T02:38:50.128Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8183, MT8188, MT8195, MT8390, MT8395, MT8673, MT8675, MT8676, MT8678",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0 / Yocto 2.6, 3.3, 4.0 / openWRT 19.07, 21.02, 23.05 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944204; Issue ID: MSV-1560."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-02T02:07:31.421Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20085",
    "datePublished": "2024-09-02T02:07:31.421Z",
    "dateReserved": "2023-11-02T13:35:35.173Z",
    "dateUpdated": "2024-10-27T02:38:50.128Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20060 (GCVE-0-2024-20060)
Vulnerability from cvelistv5
Published
2024-05-06 02:51
Modified
2025-03-20 20:54
CWE
  • CWE-1332 - Improper Handling of Faults that Lead to Instruction Skips
Summary
In da, there is a possible escalation of privilege due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541749; Issue ID: ALPS08541754.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6580",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:mediatek:mt6768:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6833",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6853",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6877",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6883",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6885",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6889",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6893",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8188",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8390",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "android_14.0",
                "status": "affected",
                "version": "android_12.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "LOW",
              "baseScore": 5.9,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20060",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-07T19:10:57.898401Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-20T20:54:59.547Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.597Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT6989, MT8188, MT8370, MT8390",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In da, there is a possible escalation of privilege due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541749; Issue ID: ALPS08541754."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1332",
              "description": "CWE-1332 Improper Handling of Faults that Lead to Instruction Skips",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-06T02:51:57.024Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20060",
    "datePublished": "2024-05-06T02:51:57.024Z",
    "dateReserved": "2023-11-02T13:35:35.162Z",
    "dateUpdated": "2025-03-20T20:54:59.547Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20144 (GCVE-0-2024-20144)
Vulnerability from cvelistv5
Published
2025-01-06 03:17
Modified
2025-01-06 14:18
CWE
Summary
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2041.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.6,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20144",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T14:18:52.995958Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-06T14:18:57.284Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6880, MT6885, MT6886, MT6890, MT6893, MT6895, MT6897, MT6980, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0, 15.0 / openWRT 19.07, 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2041."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T03:17:46.455Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20144",
    "datePublished": "2025-01-06T03:17:46.455Z",
    "dateReserved": "2023-11-02T13:35:35.185Z",
    "dateUpdated": "2025-01-06T14:18:57.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20150 (GCVE-0-2024-20150)
Vulnerability from cvelistv5
Published
2025-01-06 03:17
Modified
2025-01-06 14:13
CWE
  • CWE-502 - Deserialization of Untrusted Data
Summary
In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01412526; Issue ID: MSV-2018.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20150",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T14:13:49.851498Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-06T14:13:53.673Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6880T, MT6880U, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8797, MT8798, MT8863",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, LR13, NR15, NR16, NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01412526; Issue ID: MSV-2018."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502 Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T03:17:56.513Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20150",
    "datePublished": "2025-01-06T03:17:56.513Z",
    "dateReserved": "2023-11-02T13:35:35.188Z",
    "dateUpdated": "2025-01-06T14:13:53.673Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20022 (GCVE-0-2024-20022)
Vulnerability from cvelistv5
Published
2024-03-04 02:43
Modified
2025-03-13 13:56
CWE
  • Elevation of Privilege
Summary
In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.656Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2737",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6835",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6855",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6879",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6880",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6886",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6895",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6980",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6983",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6985",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6989",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6990",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8321",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8385",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8673",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8789",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8791",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8796",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8797",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8798",
            "vendor": "mediatek",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20022",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-08T05:00:25.856466Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-13T13:56:39.896Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT6789, MT6835, MT6855, MT6879, MT6880, MT6886, MT6890, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8321, MT8385, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8796, MT8797, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0, 14.0 / OpenWrt 19.07, 21.02 / Yocto 3.3 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-04T02:43:30.832Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20022",
    "datePublished": "2024-03-04T02:43:30.832Z",
    "dateReserved": "2023-11-02T13:35:35.151Z",
    "dateUpdated": "2025-03-13T13:56:39.896Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20148 (GCVE-0-2024-20148)
Vulnerability from cvelistv5
Published
2025-01-06 03:17
Modified
2025-01-08 04:55
Severity ?
CWE
Summary
In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20148",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-07T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-08T04:55:50.305Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT3603, MT6835, MT6878, MT6886, MT6897, MT7902, MT7920, MT7922, MT8518S, MT8532, MT8766, MT8768, MT8775, MT8796, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0 / SDK release 2.4 and before / Yocto 3.3, 4.0, 5.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T03:17:51.547Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20148",
    "datePublished": "2025-01-06T03:17:51.547Z",
    "dateReserved": "2023-11-02T13:35:35.186Z",
    "dateUpdated": "2025-01-08T04:55:50.305Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}