Vulnerabilites related to mediatek - mt7993
Vulnerability from fkie_nvd
Published
2025-06-02 03:15
Modified
2025-07-18 17:16
Severity ?
Summary
In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD86CC1-BD46-42D2-9112-190CCAC96B30",
              "versionEndIncluding": "7.6.7.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AB22996-9C22-4B6C-9E94-E4C055D16335",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5AA441-5381-4179-89EB-1642120F72B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "490CD97B-021F-4350-AEE7-A2FA866D5889",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40A9E917-4B34-403F-B512-09EEBEA46811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4901B2A5-B0C8-4A0C-AC17-87D469744817",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7992:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D01D7D-A88D-471D-A23A-42AF4DF82952",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7993:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76653163-7627-4C63-A5E2-6277C0EFE23E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303."
    },
    {
      "lang": "es",
      "value": "En el controlador del punto de acceso WLAN, existe una forma posible de inyectar un paquete arbitrario debido a la falta de verificaci\u00f3n de permisos. Esto podr\u00eda provocar una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: WCNCR00413202; ID de problema: MSV-3303."
    }
  ],
  "id": "CVE-2025-20674",
  "lastModified": "2025-07-18T17:16:22.560",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-06-02T03:15:24.737",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2025"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "security@mediatek.com",
      "type": "Secondary"
    }
  ]
}

CVE-2025-20674 (GCVE-0-2025-20674)
Vulnerability from cvelistv5
Published
2025-06-02 02:29
Modified
2025-06-03 03:55
Severity ?
CWE
  • CWE-863 - Incorrect Authorization
Summary
In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303.
Impacted products
Vendor Product Version
MediaTek, Inc. MT6890, MT6990, MT7915, MT7916, MT7981, MT7986, MT7990, MT7992, MT7993 Version: SDK release 7.6.7.2 and before / OpenWrt 19.07, 21.02 (MT6890) / OpenWrt 21.02, 23.05 (MT6990)
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20674",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-02T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T03:55:10.358Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6890, MT6990, MT7915, MT7916, MT7981, MT7986, MT7990, MT7992, MT7993",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "SDK release 7.6.7.2 and before / OpenWrt 19.07, 21.02 (MT6890) / OpenWrt 21.02, 23.05 (MT6990)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "CWE-863 Incorrect Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-02T02:29:41.639Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20674",
    "datePublished": "2025-06-02T02:29:41.639Z",
    "dateReserved": "2024-11-01T01:21:50.371Z",
    "dateUpdated": "2025-06-03T03:55:10.358Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}