Vulnerabilites related to mediatek - mt6757cd
cve-2022-20018
Vulnerability from cvelistv5
Published
2022-01-04 15:56
Modified
2024-08-03 01:55
Severity ?
Summary
In seninf driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863018; Issue ID: ALPS05863018.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.209Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6739, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8167, MT8168, MT8173, MT8362A, MT8365",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In seninf driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863018; Issue ID: ALPS05863018.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-01-04T15:56:51",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20018",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6739, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8167, MT8168, MT8173, MT8362A, MT8365",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In seninf driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863018; Issue ID: ALPS05863018.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20018",
      datePublished: "2022-01-04T15:56:51",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.209Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20031
Vulnerability from cvelistv5
Published
2022-02-09 22:05
Modified
2024-08-03 01:55
Severity ?
Summary
In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.099Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-09T22:05:36",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20031",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/February-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20031",
      datePublished: "2022-02-09T22:05:36",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.099Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20711
Vulnerability from cvelistv5
Published
2023-05-15 00:00
Modified
2025-01-24 19:10
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581668; Issue ID: ALPS07581668.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.938Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20711",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-24T19:09:56.430594Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-125",
                        description: "CWE-125 Out-of-bounds Read",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-24T19:10:00.382Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581668; Issue ID: ALPS07581668.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-15T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20711",
      datePublished: "2023-05-15T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-01-24T19:10:00.382Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20784
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-11-14 14:59
Severity ?
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826989; Issue ID: ALPS07826989.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.968Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20784",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-14T14:59:09.375025Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-14T14:59:34.763Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826989; Issue ID: ALPS07826989.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-07T03:21:08.559Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20784",
      datePublished: "2023-08-07T03:21:08.559Z",
      dateReserved: "2022-10-28T02:03:10.777Z",
      dateUpdated: "2024-11-14T14:59:34.763Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20775
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 16:23
Severity ?
Summary
In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.088Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20775",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-12-04T16:22:40.243485Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-04T16:23:07.238Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6739, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6983, MT6985, MT6990, MT8168, MT8183, MT8195, MT8673, MT8781",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0 / OpenWrt 21.02 / RDKB 2022Q3",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-04T01:44:43.844Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20775",
      datePublished: "2023-07-04T01:44:43.844Z",
      dateReserved: "2022-10-28T02:03:10.775Z",
      dateUpdated: "2024-12-04T16:23:07.238Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-32876
Vulnerability from cvelistv5
Published
2024-01-02 02:49
Modified
2024-08-02 15:32
Severity ?
Summary
In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308612; Issue ID: ALPS08308612.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:32:45.316Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308612; Issue ID: ALPS08308612.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-02T02:49:41.753Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-32876",
      datePublished: "2024-01-02T02:49:41.753Z",
      dateReserved: "2023-05-16T03:04:32.171Z",
      dateUpdated: "2024-08-02T15:32:45.316Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20019
Vulnerability from cvelistv5
Published
2022-01-04 15:56
Modified
2024-08-03 01:55
Severity ?
Summary
In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.134Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6595, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8768",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-01-04T15:56:57",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20019",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6595, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8768",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20019",
      datePublished: "2022-01-04T15:56:57",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.134Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-32640
Vulnerability from cvelistv5
Published
2023-01-03 00:00
Modified
2025-04-10 15:51
Summary
In meta wifi, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441652; Issue ID: ALPS07441652.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T07:46:44.675Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2022-32640",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-10T15:50:58.433577Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-10T15:51:39.520Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In meta wifi, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441652; Issue ID: ALPS07441652.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-03T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-32640",
      datePublished: "2023-01-03T00:00:00.000Z",
      dateReserved: "2022-06-09T00:00:00.000Z",
      dateUpdated: "2025-04-10T15:51:39.520Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20688
Vulnerability from cvelistv5
Published
2023-04-06 00:00
Modified
2025-02-12 15:22
Summary
In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441821; Issue ID: ALPS07441821.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.591Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20688",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-12T15:21:29.259466Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-125",
                        description: "CWE-125 Out-of-bounds Read",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-12T15:22:47.750Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT2715, MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8167, MT8168, MT8169, MT8173, MT8175, MT8183, MT8185, MT8188, MT8192, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8673, MT8675, MT8696, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8891",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441821; Issue ID: ALPS07441821.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-06T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20688",
      datePublished: "2023-04-06T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-02-12T15:22:47.750Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-32889
Vulnerability from cvelistv5
Published
2024-01-02 02:50
Modified
2024-08-02 15:32
Severity ?
Summary
In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161825; Issue ID: MOLY01161825 (MSV-895).
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:32:46.473Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Modem NR15, NR16, and NR17",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161825; Issue ID: MOLY01161825 (MSV-895).",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-02T02:50:05.797Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-32889",
      datePublished: "2024-01-02T02:50:05.797Z",
      dateReserved: "2023-05-16T03:04:32.174Z",
      dateUpdated: "2024-08-02T15:32:46.473Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-32872
Vulnerability from cvelistv5
Published
2024-01-02 02:49
Modified
2024-08-02 15:32
Severity ?
Summary
In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08308607.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:32:46.517Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08308607.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-02T02:49:36.395Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-32872",
      datePublished: "2024-01-02T02:49:36.395Z",
      dateReserved: "2023-05-16T03:04:32.164Z",
      dateUpdated: "2024-08-02T15:32:46.517Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20623
Vulnerability from cvelistv5
Published
2023-03-07 00:00
Modified
2025-03-06 17:03
Summary
In ion, there is a possible escalation of privilege due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559778; Issue ID: ALPS07559778.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:36.972Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "HIGH",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20623",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-06T17:03:14.802163Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-367",
                        description: "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-06T17:03:18.918Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8173, MT8532, MT8666, MT8667, MT8788",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0 or Yocto 3.1, 3.3, 4.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ion, there is a possible escalation of privilege due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559778; Issue ID: ALPS07559778.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-09T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20623",
      datePublished: "2023-03-07T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-03-06T17:03:18.918Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20698
Vulnerability from cvelistv5
Published
2023-05-15 00:00
Modified
2025-01-23 21:23
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07589144; Issue ID: ALPS07589144.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.544Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20698",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-23T21:21:57.248469Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-125",
                        description: "CWE-125 Out-of-bounds Read",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-23T21:23:30.907Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07589144; Issue ID: ALPS07589144.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-15T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20698",
      datePublished: "2023-05-15T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-01-23T21:23:30.907Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20015
Vulnerability from cvelistv5
Published
2022-01-04 15:56
Modified
2024-08-03 01:55
Severity ?
Summary
In kd_camera_hw driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862966; Issue ID: ALPS05862966.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.201Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6739, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8169",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In kd_camera_hw driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862966; Issue ID: ALPS05862966.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-01-04T15:56:39",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20015",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6739, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8169",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In kd_camera_hw driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862966; Issue ID: ALPS05862966.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20015",
      datePublished: "2022-01-04T15:56:39",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.201Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20654
Vulnerability from cvelistv5
Published
2023-04-06 00:00
Modified
2025-03-17 18:22
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589148.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:39.816Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20654",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-17T18:21:58.096346Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-17T18:22:07.197Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8192, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8871, MT8891",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589148.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-06T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20654",
      datePublished: "2023-04-06T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-03-17T18:22:07.197Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20709
Vulnerability from cvelistv5
Published
2023-05-15 00:00
Modified
2025-01-24 19:12
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07576951; Issue ID: ALPS07576951.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.334Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20709",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-24T19:12:39.148082Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-1284",
                        description: "CWE-1284 Improper Validation of Specified Quantity in Input",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-24T19:12:43.492Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07576951; Issue ID: ALPS07576951.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-15T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20709",
      datePublished: "2023-05-15T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-01-24T19:12:43.492Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20782
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:39
Severity ?
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550103.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.130Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20782",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-17T14:38:38.683318Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-17T14:39:18.686Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550103.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-07T03:21:04.622Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20782",
      datePublished: "2023-08-07T03:21:04.622Z",
      dateReserved: "2022-10-28T02:03:10.776Z",
      dateUpdated: "2024-10-17T14:39:18.686Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20710
Vulnerability from cvelistv5
Published
2023-05-15 00:00
Modified
2025-01-24 19:11
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07576935; Issue ID: ALPS07576935.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.621Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20710",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-24T19:11:48.905579Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-1284",
                        description: "CWE-1284 Improper Validation of Specified Quantity in Input",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-24T19:11:52.529Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07576935; Issue ID: ALPS07576935.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-15T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20710",
      datePublished: "2023-05-15T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-01-24T19:11:52.529Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20022
Vulnerability from cvelistv5
Published
2022-01-04 15:57
Modified
2024-08-03 01:55
Severity ?
Summary
In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.393Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT7662T, MT7663, MT7668, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8362B, MT8385, MT8765, MT8788",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-01-04T15:57:18",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20022",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT7662T, MT7663, MT7668, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8362B, MT8385, MT8765, MT8788",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20022",
      datePublished: "2022-01-04T15:57:18",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.393Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20635
Vulnerability from cvelistv5
Published
2023-03-07 00:00
Modified
2025-03-05 18:36
Summary
In keyinstall, there is a possible information disclosure due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07563028.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:36.260Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20635",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-05T18:33:38.907697Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-191",
                        description: "CWE-191 Integer Underflow (Wrap or Wraparound)",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-05T18:36:10.980Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible information disclosure due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07563028.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-09T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20635",
      datePublished: "2023-03-07T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-03-05T18:36:10.980Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20707
Vulnerability from cvelistv5
Published
2023-05-15 00:00
Modified
2025-01-24 19:16
Summary
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628556; Issue ID: ALPS07628556.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.975Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20707",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-24T19:15:58.899064Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-1284",
                        description: "CWE-1284 Improper Validation of Specified Quantity in Input",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-24T19:16:02.922Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628556; Issue ID: ALPS07628556.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-15T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20707",
      datePublished: "2023-05-15T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-01-24T19:16:02.922Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20605
Vulnerability from cvelistv5
Published
2023-02-06 00:00
Modified
2025-03-26 14:12
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550104.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:45.861Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20605",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-26T14:11:25.893904Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-119",
                        description: "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-26T14:12:16.349Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550104.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-02-06T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20605",
      datePublished: "2023-02-06T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-03-26T14:12:16.349Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20652
Vulnerability from cvelistv5
Published
2023-04-06 00:00
Modified
2025-02-13 15:32
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589135.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:39.911Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20652",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-13T15:31:50.501343Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-13T15:32:18.599Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8192, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8871, MT8891",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589135.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-06T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20652",
      datePublished: "2023-04-06T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-02-13T15:32:18.599Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0672
Vulnerability from cvelistv5
Published
2021-11-18 14:54
Modified
2024-08-03 15:47
Severity ?
Summary
In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035
References
Impacted products
Vendor Product Version
n/a Android Version: Android SoC
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.235Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://source.android.com/security/bulletin/2021-11-01",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Android",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android SoC",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-15T18:05:34",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://source.android.com/security/bulletin/2021-11-01",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0672",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Android",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android SoC",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://source.android.com/security/bulletin/2021-11-01",
                     refsource: "MISC",
                     url: "https://source.android.com/security/bulletin/2021-11-01",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0672",
      datePublished: "2021-11-18T14:54:11",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.235Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-20012
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2024-08-01 21:52
Severity ?
Summary
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T21:52:31.535Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6895, MT6983, MT6985, MT8321, MT8385, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-05T05:59:35.241Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2024-20012",
      datePublished: "2024-02-05T05:59:35.241Z",
      dateReserved: "2023-11-02T13:35:35.150Z",
      dateUpdated: "2024-08-01T21:52:31.535Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20833
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-28 01:35
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017764.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.207Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20833",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-02T14:08:35.400557Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-862",
                        description: "CWE-862 Missing Authorization",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-28T01:35:33.140Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017764.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-09-04T02:27:37.358Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/September-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20833",
      datePublished: "2023-09-04T02:27:37.358Z",
      dateReserved: "2022-10-28T02:03:23.685Z",
      dateUpdated: "2024-10-28T01:35:33.140Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-32599
Vulnerability from cvelistv5
Published
2023-04-06 00:00
Modified
2025-02-12 15:59
Summary
In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07460390.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T07:46:44.660Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2022-32599",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-12T15:58:36.495639Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-12T15:59:26.451Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07460390.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-06T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-32599",
      datePublished: "2023-04-06T00:00:00.000Z",
      dateReserved: "2022-06-09T00:00:00.000Z",
      dateUpdated: "2025-02-12T15:59:26.451Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20741
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-07 20:14
Summary
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628606.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.939Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20741",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-07T20:14:16.559947Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-125",
                        description: "CWE-125 Out-of-bounds Read",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-07T20:14:52.837Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628606.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-06T12:11:33.302Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20741",
      datePublished: "2023-06-06T12:11:33.302Z",
      dateReserved: "2022-10-28T02:03:10.768Z",
      dateUpdated: "2025-01-07T20:14:52.837Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20021
Vulnerability from cvelistv5
Published
2022-01-04 15:57
Modified
2024-08-03 01:55
Severity ?
Summary
In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.202Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT7662T, MT7663, MT7668, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8362B, MT8385, MT8765, MT8788",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-01-04T15:57:13",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20021",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT7662T, MT7663, MT7668, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8362B, MT8385, MT8765, MT8788",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20021",
      datePublished: "2022-01-04T15:57:13",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.202Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20109
Vulnerability from cvelistv5
Published
2022-05-03 19:56
Modified
2024-08-03 02:02
Severity ?
Summary
In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.884Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 9.0, 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T19:56:22",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20109",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 9.0, 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20109",
      datePublished: "2022-05-03T19:56:22",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.884Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0622
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.181Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-18T14:55:30",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0622",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0622",
      datePublished: "2021-11-18T14:55:30",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.181Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0611
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:47
Severity ?
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.038Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:56",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0611",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0611",
      datePublished: "2021-09-27T11:20:56",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.038Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20051
Vulnerability from cvelistv5
Published
2022-03-09 17:02
Modified
2024-08-03 01:55
Severity ?
Summary
In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.121Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-09T17:02:32",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20051",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/March-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20051",
      datePublished: "2022-03-09T17:02:32",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.121Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20611
Vulnerability from cvelistv5
Published
2023-02-06 00:00
Modified
2025-03-26 14:03
Summary
In gpu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588678; Issue ID: ALPS07588678.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:36.911Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "HIGH",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20611",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-26T14:02:00.396170Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-662",
                        description: "CWE-662 Improper Synchronization",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-26T14:03:15.133Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8168, MT8365",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In gpu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588678; Issue ID: ALPS07588678.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-02-06T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20611",
      datePublished: "2023-02-06T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-03-26T14:03:15.133Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-21743
Vulnerability from cvelistv5
Published
2022-05-03 20:06
Modified
2024-08-03 02:53
Severity ?
Summary
In ion, there is a possible use after free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06371108; Issue ID: ALPS06371108.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:53:36.139Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 9.0, 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ion, there is a possible use after free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06371108; Issue ID: ALPS06371108.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T20:06:47",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-21743",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 9.0, 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ion, there is a possible use after free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06371108; Issue ID: ALPS06371108.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-21743",
      datePublished: "2022-05-03T20:06:47",
      dateReserved: "2021-11-26T00:00:00",
      dateUpdated: "2024-08-03T02:53:36.139Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0674
Vulnerability from cvelistv5
Published
2021-12-17 16:10
Modified
2024-08-03 15:47
Severity ?
Summary
In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.249Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/December-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6570, MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 8.1, 9.0, 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-17T16:10:17",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/December-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0674",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6570, MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 8.1, 9.0, 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/December-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/December-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0674",
      datePublished: "2021-12-17T16:10:17",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.249Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0624
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.237Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-18T14:55:53",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0624",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0624",
      datePublished: "2021-11-18T14:55:53",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.237Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0422
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:40:01.116Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:27",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0422",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0422",
      datePublished: "2021-09-27T11:20:27",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:40:01.116Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20755
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 17:21
Severity ?
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07509605.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.984Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20755",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-12-04T17:20:57.998358Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-04T17:21:10.822Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07509605.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-04T01:44:05.320Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20755",
      datePublished: "2023-07-04T01:44:05.320Z",
      dateReserved: "2022-10-28T02:03:10.771Z",
      dateUpdated: "2024-12-04T17:21:10.822Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20753
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 17:30
Severity ?
Summary
In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07588667.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.980Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20753",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-12-04T17:29:57.960827Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-04T17:30:09.749Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07588667.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-04T01:44:07.720Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20753",
      datePublished: "2023-07-04T01:44:07.720Z",
      dateReserved: "2022-10-28T02:03:10.771Z",
      dateUpdated: "2024-12-04T17:30:09.749Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20085
Vulnerability from cvelistv5
Published
2022-05-03 19:57
Modified
2024-08-03 02:02
Severity ?
Summary
In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.573Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T19:57:05",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20085",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20085",
      datePublished: "2022-05-03T19:57:05",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.573Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-32641
Vulnerability from cvelistv5
Published
2023-01-03 00:00
Modified
2025-04-10 16:05
Summary
In meta wifi, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453594; Issue ID: ALPS07453594.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T07:46:44.833Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2022-32641",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-10T16:04:53.680909Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-125",
                        description: "CWE-125 Out-of-bounds Read",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-10T16:05:34.692Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In meta wifi, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453594; Issue ID: ALPS07453594.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-03T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-32641",
      datePublished: "2023-01-03T00:00:00.000Z",
      dateReserved: "2022-06-09T00:00:00.000Z",
      dateUpdated: "2025-04-10T16:05:34.692Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-20010
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2025-04-17 15:33
Summary
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358560; Issue ID: ALPS08358560.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T21:52:31.714Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2024-20010",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-17T15:32:38.690465Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-843",
                        description: "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-17T15:33:06.702Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358560; Issue ID: ALPS08358560.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-05T05:59:30.948Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2024-20010",
      datePublished: "2024-02-05T05:59:30.948Z",
      dateReserved: "2023-11-02T13:35:35.148Z",
      dateUpdated: "2025-04-17T15:33:06.702Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0425
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:40:01.056Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:45",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0425",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0425",
      datePublished: "2021-09-27T11:20:45",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:40:01.056Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20646
Vulnerability from cvelistv5
Published
2023-03-07 00:00
Modified
2025-03-05 19:12
Summary
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628536; Issue ID: ALPS07628536.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.003Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20646",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-05T19:12:16.116750Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-20",
                        description: "CWE-20 Improper Input Validation",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-05T19:12:20.039Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628536; Issue ID: ALPS07628536.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-09T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20646",
      datePublished: "2023-03-07T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-03-05T19:12:20.039Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20084
Vulnerability from cvelistv5
Published
2022-05-03 19:55
Modified
2024-08-03 02:02
Severity ?
Summary
In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.518Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T19:55:34",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20084",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20084",
      datePublished: "2022-05-03T19:55:34",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.518Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20754
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 17:20
Severity ?
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07588343.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.000Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20754",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-12-04T17:20:28.578341Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-04T17:20:42.540Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07588343.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-04T01:44:02.816Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20754",
      datePublished: "2023-07-04T01:44:02.816Z",
      dateReserved: "2022-10-28T02:03:10.771Z",
      dateUpdated: "2024-12-04T17:20:42.540Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20756
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 21:42
Severity ?
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07549928.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.005Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20756",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-12-04T18:59:16.103998Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-04T21:42:31.141Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07549928.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-04T01:44:10.299Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20756",
      datePublished: "2023-07-04T01:44:10.299Z",
      dateReserved: "2022-10-28T02:03:10.771Z",
      dateUpdated: "2024-12-04T21:42:31.141Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20076
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.475Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-11T19:38:07",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20076",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/April-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20076",
      datePublished: "2022-04-11T19:38:07",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.475Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20036
Vulnerability from cvelistv5
Published
2022-02-09 22:05
Modified
2024-08-03 01:55
Severity ?
Summary
In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171689; Issue ID: ALPS06171689.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.299Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171689; Issue ID: ALPS06171689.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-09T22:05:41",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20036",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171689; Issue ID: ALPS06171689.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/February-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20036",
      datePublished: "2022-02-09T22:05:41",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.299Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0424
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:40:01.167Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:39",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0424",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0424",
      datePublished: "2021-09-27T11:20:39",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:40:01.167Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0421
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:40:01.266Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:21",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0421",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0421",
      datePublished: "2021-09-27T11:20:21",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:40:01.266Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20037
Vulnerability from cvelistv5
Published
2022-02-09 22:05
Modified
2024-08-03 01:55
Severity ?
Summary
In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.123Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-09T22:05:41",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20037",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/February-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20037",
      datePublished: "2022-02-09T22:05:41",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.123Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20653
Vulnerability from cvelistv5
Published
2023-04-06 00:00
Modified
2025-02-13 15:30
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589144.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.131Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20653",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-13T15:29:49.981769Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-13T15:30:21.167Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8192, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8871, MT8891",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589144.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-06T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20653",
      datePublished: "2023-04-06T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-02-13T15:30:21.167Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20708
Vulnerability from cvelistv5
Published
2023-05-15 00:00
Modified
2025-01-24 19:15
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581655; Issue ID: ALPS07581655.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.970Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20708",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-24T19:15:09.067653Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-1284",
                        description: "CWE-1284 Improper Validation of Specified Quantity in Input",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-24T19:15:13.506Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581655; Issue ID: ALPS07581655.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-15T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20708",
      datePublished: "2023-05-15T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-01-24T19:15:13.506Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0610
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:47
Severity ?
Summary
In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:27.924Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:50",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0610",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0610",
      datePublished: "2021-09-27T11:20:50",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:27.924Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20697
Vulnerability from cvelistv5
Published
2023-05-15 00:00
Modified
2025-01-23 21:27
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07589148; Issue ID: ALPS07589148.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.943Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20697",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-23T21:25:15.557341Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-125",
                        description: "CWE-125 Out-of-bounds Read",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-23T21:27:40.662Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07589148; Issue ID: ALPS07589148.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-15T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20697",
      datePublished: "2023-05-15T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-01-23T21:27:40.662Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0620
Vulnerability from cvelistv5
Published
2021-11-18 14:54
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.225Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-18T14:54:52",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0620",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0620",
      datePublished: "2021-11-18T14:54:52",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.225Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20742
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-07 21:08
Summary
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628540.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.936Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20742",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-07T21:08:04.127345Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-125",
                        description: "CWE-125 Out-of-bounds Read",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-07T21:08:15.849Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628540.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-06T12:11:35.201Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20742",
      datePublished: "2023-06-06T12:11:35.201Z",
      dateReserved: "2022-10-28T02:03:10.768Z",
      dateUpdated: "2025-01-07T21:08:15.849Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20616
Vulnerability from cvelistv5
Published
2023-02-06 00:00
Modified
2025-03-26 19:17
Summary
In ion, there is a possible out of bounds read due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560720; Issue ID: ALPS07560720.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:45.867Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20616",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-26T19:17:44.804066Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-843",
                        description: "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-26T19:17:49.133Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8168, MT8183, MT8321, MT8365, MT8385, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ion, there is a possible out of bounds read due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560720; Issue ID: ALPS07560720.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-02-06T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20616",
      datePublished: "2023-02-06T00:00:00.000Z",
      dateReserved: "2022-10-28T00:00:00.000Z",
      dateUpdated: "2025-03-26T19:17:49.133Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0621
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.224Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8184, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-18T14:55:03",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0621",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8184, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0621",
      datePublished: "2021-11-18T14:55:03",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.224Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-26447
Vulnerability from cvelistv5
Published
2022-09-06 17:19
Modified
2024-08-03 05:03
Severity ?
Summary
In BT firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784478; Issue ID: ALPS06784478.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T05:03:32.907Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8385, MT8518, MT8532, MT8765, MT8788",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0 and Yocto 3.1",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In BT firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784478; Issue ID: ALPS06784478.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-09-06T17:19:04",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-26447",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8385, MT8518, MT8532, MT8765, MT8788",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0, 12.0 and Yocto 3.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In BT firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784478; Issue ID: ALPS06784478.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Remote Code Execution",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-26447",
      datePublished: "2022-09-06T17:19:04",
      dateReserved: "2022-03-04T00:00:00",
      dateUpdated: "2024-08-03T05:03:32.907Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20023
Vulnerability from cvelistv5
Published
2022-01-04 15:57
Modified
2024-08-03 01:55
Severity ?
Summary
In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.190Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT7662T, MT7663, MT7668, MT7915, MT7920, MT7921, MT7922, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8362B, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-01-04T15:57:24",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20023",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT7662T, MT7663, MT7668, MT7915, MT7920, MT7921, MT7922, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8362B, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20023",
      datePublished: "2022-01-04T15:57:24",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.190Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-32636
Vulnerability from cvelistv5
Published
2023-01-03 00:00
Modified
2025-04-10 16:09
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07510064.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T07:46:44.608Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2022-32636",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-10T16:09:13.646479Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-10T16:09:44.607Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07510064.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-03T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-32636",
      datePublished: "2023-01-03T00:00:00.000Z",
      dateReserved: "2022-06-09T00:00:00.000Z",
      dateUpdated: "2025-04-10T16:09:44.607Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0612
Vulnerability from cvelistv5
Published
2021-09-27 11:21
Modified
2024-08-03 15:47
Severity ?
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:27.962Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:21:03",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0612",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0612",
      datePublished: "2021-09-27T11:21:03",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:27.962Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-21749
Vulnerability from cvelistv5
Published
2022-06-06 17:35
Modified
2024-08-03 02:53
Severity ?
Summary
In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:53:35.613Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-06-06T17:35:58",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-21749",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/June-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-21749",
      datePublished: "2022-06-06T17:35:58",
      dateReserved: "2021-11-26T00:00:00",
      dateUpdated: "2024-08-03T02:53:35.613Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0675
Vulnerability from cvelistv5
Published
2021-12-15 18:05
Modified
2024-08-03 15:47
Severity ?
Summary
In alac decoder, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064258.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.238Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/December-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6570, MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 8.1, 9.0, 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In alac decoder, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064258.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-17T16:10:03",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/December-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0675",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6570, MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 8.1, 9.0, 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In alac decoder, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064258.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/December-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/December-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0675",
      datePublished: "2021-12-15T18:05:52",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.238Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20781
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:40
Severity ?
Summary
In keyinstall, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS07905323.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.208Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20781",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-17T14:40:07.455816Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-17T14:40:21.172Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS07905323.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-07T03:21:02.665Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20781",
      datePublished: "2023-08-07T03:21:02.665Z",
      dateReserved: "2022-10-28T02:03:10.776Z",
      dateUpdated: "2024-10-17T14:40:21.172Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0423
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:40:01.118Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:33",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0423",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0423",
      datePublished: "2021-09-27T11:20:33",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:40:01.118Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-21755
Vulnerability from cvelistv5
Published
2022-06-06 17:39
Modified
2024-08-03 02:53
Severity ?
Summary
In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:53:36.244Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8667, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-06-06T17:39:06",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-21755",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8667, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/June-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-21755",
      datePublished: "2022-06-06T17:39:06",
      dateReserved: "2021-11-26T00:00:00",
      dateUpdated: "2024-08-03T02:53:36.244Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-32875
Vulnerability from cvelistv5
Published
2024-01-02 02:49
Modified
2024-09-06 17:56
Severity ?
Summary
In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08304217.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:32:45.331Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-32875",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-22T20:31:49.361360Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-06T17:56:05.698Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08304217.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-02T02:49:39.992Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-32875",
      datePublished: "2024-01-02T02:49:39.992Z",
      dateReserved: "2023-05-16T03:04:32.171Z",
      dateUpdated: "2024-09-06T17:56:05.698Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-20013
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2024-08-01 21:52
Severity ?
Summary
In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08471742; Issue ID: ALPS08308608.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T21:52:31.685Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0, 14.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08471742; Issue ID: ALPS08308608.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-05T05:59:36.678Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2024-20013",
      datePublished: "2024-02-05T05:59:36.678Z",
      dateReserved: "2023-11-02T13:35:35.150Z",
      dateUpdated: "2024-08-01T21:52:31.685Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0623
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.200Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8186, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-18T14:55:44",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0623",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8186, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0623",
      datePublished: "2021-11-18T14:55:44",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.200Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-32619
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2025-04-24 15:08
Summary
In keyinstall, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07439659; Issue ID: ALPS07439659.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T07:46:44.621Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/December-2022",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2022-32619",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-24T15:07:50.709839Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-24T15:08:19.465Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07439659; Issue ID: ALPS07439659.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-12-05T00:00:00.000Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/December-2022",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-32619",
      datePublished: "2022-12-05T00:00:00.000Z",
      dateReserved: "2022-06-09T00:00:00.000Z",
      dateUpdated: "2025-04-24T15:08:19.465Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20768
Vulnerability from cvelistv5
Published
2023-07-04 01:44
Modified
2024-12-04 21:41
Severity ?
Summary
In ion, there is a possible out of bounds read due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560720; Issue ID: ALPS07559800.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.970Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20768",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-12-04T19:09:15.252941Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-04T21:41:05.844Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8168, MT8195, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ion, there is a possible out of bounds read due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560720; Issue ID: ALPS07559800.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-04T01:44:31.226Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20768",
      datePublished: "2023-07-04T01:44:31.226Z",
      dateReserved: "2022-10-28T02:03:10.774Z",
      dateUpdated: "2024-12-04T21:41:05.844Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-32835
Vulnerability from cvelistv5
Published
2023-11-06 03:50
Modified
2025-04-24 15:47
Summary
In keyinstall, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08157918; Issue ID: ALPS08157918.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:25:37.189Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/November-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-32835",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-23T13:25:50.681245Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-843",
                        description: "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-24T15:47:50.374Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08157918; Issue ID: ALPS08157918.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-06T03:50:47.125Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/November-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-32835",
      datePublished: "2023-11-06T03:50:47.125Z",
      dateReserved: "2023-05-16T03:04:32.152Z",
      dateUpdated: "2025-04-24T15:47:50.374Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20739
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-07 21:11
Summary
In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559819.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.971Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20739",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-07T21:11:45.498448Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-07T21:11:50.842Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8365, MT8395, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0 / Yocto 4.0 / Iot-Yocto 22.2",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559819.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-06T12:11:29.214Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20739",
      datePublished: "2023-06-06T12:11:29.214Z",
      dateReserved: "2022-10-28T02:03:10.767Z",
      dateUpdated: "2025-01-07T21:11:50.842Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20110
Vulnerability from cvelistv5
Published
2022-05-03 19:56
Modified
2024-08-03 02:02
Severity ?
Summary
In ion, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399901.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.576Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 9.0, 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ion, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399901.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T19:56:43",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20110",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 9.0, 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ion, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399901.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20110",
      datePublished: "2022-05-03T19:56:43",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.576Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20780
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:41
Severity ?
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017756.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.005Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20780",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-17T14:41:07.970344Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-17T14:41:18.229Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017756.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-07T03:21:00.627Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20780",
      datePublished: "2023-08-07T03:21:00.627Z",
      dateReserved: "2022-10-28T02:03:10.776Z",
      dateUpdated: "2024-10-17T14:41:18.229Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20093
Vulnerability from cvelistv5
Published
2022-05-03 19:59
Modified
2024-08-03 02:02
Severity ?
Summary
In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.621Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T19:59:02",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20093",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20093",
      datePublished: "2022-05-03T19:59:02",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.621Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20783
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-11-14 15:00
Severity ?
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826905; Issue ID: ALPS07826905.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.968Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20783",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-14T15:00:04.910781Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-14T15:00:14.635Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826905; Issue ID: ALPS07826905.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-07T03:21:06.590Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20783",
      datePublished: "2023-08-07T03:21:06.590Z",
      dateReserved: "2022-10-28T02:03:10.777Z",
      dateUpdated: "2024-11-14T15:00:14.635Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-21758
Vulnerability from cvelistv5
Published
2022-06-06 17:40
Modified
2024-08-03 02:53
Severity ?
Summary
In ccu, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06439600; Issue ID: ALPS06439600.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:53:36.299Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6833, MT6853, MT6873, MT6877, MT6885, MT6893",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ccu, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06439600; Issue ID: ALPS06439600.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-06-06T17:40:07",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-21758",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6833, MT6853, MT6873, MT6877, MT6885, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ccu, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06439600; Issue ID: ALPS06439600.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/June-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-21758",
      datePublished: "2022-06-06T17:40:07",
      dateReserved: "2021-11-26T00:00:00",
      dateUpdated: "2024-08-03T02:53:36.299Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20111
Vulnerability from cvelistv5
Published
2022-05-03 20:06
Modified
2024-08-03 02:02
Severity ?
Summary
In ion, there is a possible use after free due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06366069; Issue ID: ALPS06366069.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.579Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 9.0, 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ion, there is a possible use after free due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06366069; Issue ID: ALPS06366069.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T20:06:29",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20111",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 9.0, 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ion, there is a possible use after free due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06366069; Issue ID: ALPS06366069.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20111",
      datePublished: "2022-05-03T20:06:29",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.579Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20075
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.562Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-11T19:38:06",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20075",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/April-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20075",
      datePublished: "2022-04-11T19:38:07",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.562Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20070
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:29.751Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-11T19:38:03",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20070",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/April-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20070",
      datePublished: "2022-04-11T19:38:03",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:29.751Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.",
      },
      {
         lang: "es",
         value: "En memory management driver, se presenta una posible divulgación de información de canal lateral. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05400059",
      },
   ],
   id: "CVE-2021-0425",
   lastModified: "2024-11-21T05:42:42.010",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.737",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-03-07 21:15
Modified
2025-03-05 20:15
Summary
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628536; Issue ID: ALPS07628536.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628536; Issue ID: ALPS07628536.",
      },
   ],
   id: "CVE-2023-20646",
   lastModified: "2025-03-05T20:15:43.437",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-03-07T21:15:11.687",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-15 22:15
Modified
2025-01-23 22:15
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07589144; Issue ID: ALPS07589144.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07589144; Issue ID: ALPS07589144.",
      },
   ],
   id: "CVE-2023-20698",
   lastModified: "2025-01-23T22:15:11.177",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-15T22:15:10.647",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.",
      },
      {
         lang: "es",
         value: "En memory management driver, se presenta una posible divulgación de información debido a datos no inicializados. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05385714",
      },
   ],
   id: "CVE-2021-0423",
   lastModified: "2024-11-21T05:42:41.757",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.650",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-665",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2024-11-21 08:51
Summary
In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08471742; Issue ID: ALPS08308608.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08471742; Issue ID: ALPS08308608.",
      },
      {
         lang: "es",
         value: "En keyInstall, existe una posible escritura fuera de los límites debido a una verificación de los límites faltantes. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS08471742; ID del problema: ALPS08308608.",
      },
   ],
   id: "CVE-2024-20013",
   lastModified: "2024-11-21T08:51:47.850",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-05T06:15:47.530",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2025-04-17 16:15
Summary
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358560; Issue ID: ALPS08358560.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358560; Issue ID: ALPS08358560.",
      },
      {
         lang: "es",
         value: "En keyInstall, existe una posible escalada de privilegios debido a confusión de tipos. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS08358560; ID del problema: ALPS08358560.",
      },
   ],
   id: "CVE-2024-20010",
   lastModified: "2025-04-17T16:15:27.490",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2024-02-05T06:15:47.387",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45A7A805-EFED-47B3-884C-158FF1EECAEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988.",
      },
      {
         lang: "es",
         value: "En flv extractor, se presenta una posible lectura fuera de límites debido a un desbordamiento del búfer de la pila. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05594988; ID del Problema: ALPS05594988.",
      },
   ],
   id: "CVE-2021-0624",
   lastModified: "2024-11-21T05:43:02.423",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-18T15:15:08.343",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-12-15 19:15
Modified
2024-11-21 05:43
Summary
In alac decoder, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064258.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6570:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "975802CC-B130-4CF3-9B8E-A23DEA464259",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E5B22E8-3536-4DBC-8E71-3E14FE45A887",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In alac decoder, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064258.",
      },
      {
         lang: "es",
         value: "En el decodificador alac, existe una posible escritura fuera de límites debido a una comprobación de límites incorrecta. Esto podría llevar a una escalada local de privilegios sin necesidad de privilegios de ejecución adicionales. La interacción del usuario no es necesaria para la explotación. ID del parche: ALPS06064258; ID del problema: ALPS06064258",
      },
   ],
   id: "CVE-2021-0675",
   lastModified: "2024-11-21T05:43:07.663",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-12-15T19:15:10.573",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/December-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/December-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826905; Issue ID: ALPS07826905.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826905; Issue ID: ALPS07826905.",
      },
   ],
   id: "CVE-2023-20783",
   lastModified: "2024-11-21T07:41:31.147",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-07T04:15:12.793",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8127:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD7BDC63-3963-4C4D-B547-2936006926E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8135:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "182A995C-2453-4DF2-ABCC-A885D8C334C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E5B22E8-3536-4DBC-8E71-3E14FE45A887",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8312c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "39915BEC-73D4-46B7-B52C-CED910AF3CA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8312d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF828C6-4B05-4E12-9B78-782F1F062F39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8382:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4B7F410-9623-4878-AF8B-CB1E68B9C555",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8389:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61E84418-3D52-4C5B-919A-2C3EA3A20BC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8392:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2FE1D80-FBA8-452B-AAD1-A7BC430B44B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8392_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB784A7D-1B24-48FC-BC42-0F646BBD0B58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8665:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "367725BC-DE40-40F1-A59A-C4286CA9C0D2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FED17AD2-3B65-48EE-A56E-FEA4A5F38B8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8693:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA2890F-59A8-4CAB-BDFA-883F8A38CE4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A91F81E5-29D3-4BA7-9476-EBD644F7E4F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3FC505E-CF02-4F29-8D17-0E0C05433B0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8783:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2FD7E95-F0D4-492E-BB92-2597FB9D2884",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "584F2DD7-F353-4156-BFAB-AE6DF5BB9251",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808.",
      },
      {
         lang: "es",
         value: "En ged, se presenta una posible escritura fuera de límites debido a un desbordamiento de enteros. Esto podría conllevar a una escalada local de privilegios con los privilegios de ejecución System requeridos. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05838808; ID de Incidencia: ALPS05838808",
      },
   ],
   id: "CVE-2022-20075",
   lastModified: "2024-11-21T06:42:05.940",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-04-11T20:15:19.227",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07509605.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07509605.",
      },
   ],
   id: "CVE-2023-20755",
   lastModified: "2024-11-21T07:41:28.977",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-04T02:15:09.940",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-06 04:15
Modified
2025-04-24 16:15
Summary
In keyinstall, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08157918; Issue ID: ALPS08157918.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08157918; Issue ID: ALPS08157918.",
      },
      {
         lang: "es",
         value: "En keyinstall, existe una posible corrupción de memoria debido a confusión de tipos. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS08157918; ID del problema: ALPS08157918.",
      },
   ],
   id: "CVE-2023-32835",
   lastModified: "2025-04-24T16:15:24.900",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-11-06T04:15:07.887",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07588343.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07588343.",
      },
   ],
   id: "CVE-2023-20754",
   lastModified: "2024-11-21T07:41:28.860",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-04T02:15:09.893",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:41
Summary
In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171689; Issue ID: ALPS06171689.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171689; Issue ID: ALPS06171689.",
      },
      {
         lang: "es",
         value: "En ion driver, se presenta una posible divulgación de información debido a una comprobación de límites incorrecta. Esto podría conllevar a una divulgación de información local remota sin ser requeridos privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06171689; ID de Incidencia: ALPS06171689",
      },
   ],
   id: "CVE-2022-20036",
   lastModified: "2024-11-21T06:41:59.943",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-02-09T23:15:17.353",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-15 22:15
Modified
2025-01-24 20:15
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07576951; Issue ID: ALPS07576951.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07576951; Issue ID: ALPS07576951.",
      },
   ],
   id: "CVE-2023-20709",
   lastModified: "2025-01-24T20:15:28.400",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-15T22:15:11.073",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-1284",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-15 22:15
Modified
2025-01-23 22:15
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07589148; Issue ID: ALPS07589148.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07589148; Issue ID: ALPS07589148.",
      },
   ],
   id: "CVE-2023-20697",
   lastModified: "2025-01-23T22:15:10.980",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-15T22:15:10.603",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-02-06 20:15
Modified
2025-03-26 15:15
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550104.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550104.",
      },
   ],
   id: "CVE-2023-20605",
   lastModified: "2025-03-26T15:15:44.993",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-02-06T20:15:14.530",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826989; Issue ID: ALPS07826989.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826989; Issue ID: ALPS07826989.",
      },
   ],
   id: "CVE-2023-20784",
   lastModified: "2024-11-21T07:41:31.277",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-07T04:15:12.860",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07549928.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07549928.",
      },
   ],
   id: "CVE-2023-20756",
   lastModified: "2024-11-21T07:41:29.093",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-04T02:15:09.983",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-04 16:15
Modified
2024-11-21 06:41
Summary
In kd_camera_hw driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862966; Issue ID: ALPS05862966.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8169:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5375050-4568-4919-BFE3-A72E1C7E65A2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In kd_camera_hw driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862966; Issue ID: ALPS05862966.",
      },
      {
         lang: "es",
         value: "En el controlador kd_camera_hw, se presenta una posible divulgación de información debido a datos no inicializados. Esto podría conllevar a una divulgación de información local con los privilegios de ejecución System requeridos. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05862966; ID de Incidencia: ALPS05862966",
      },
   ],
   id: "CVE-2022-20015",
   lastModified: "2024-11-21T06:41:57.073",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-04T16:15:10.333",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-908",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-04 16:15
Modified
2024-11-21 06:41
Summary
In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC85BBB-5985-41A1-B19F-1C580C367B64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7662t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3331F3A6-E176-4EA5-B253-D5B03945C2B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10C79211-F064-499D-914E-0BACD038FBF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E400AB9-B82A-4449-8789-35112940270F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AB22996-9C22-4B6C-9E94-E4C055D16335",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "140DAC08-96E9-47D3-BC2E-65E999DCFD50",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA2A6813-7138-441E-A9E4-FF62FCBD797A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "739BE124-C307-41B2-8E92-C223FE67F88A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.",
      },
      {
         lang: "es",
         value: "En Bluetooth, se presenta un posible bloqueo de la aplicación debido a que bluetooth inunda un dispositivo con el paquete LMP_AU_rand. Esto podría conllevar a una denegación de servicio remota de bluetooth sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06198608; ID de Incidencia: ALPS06198608",
      },
   ],
   id: "CVE-2022-20023",
   lastModified: "2024-11-21T06:41:58.170",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-04T16:15:10.703",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-772",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-15 22:15
Modified
2025-01-24 20:15
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581655; Issue ID: ALPS07581655.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581655; Issue ID: ALPS07581655.",
      },
   ],
   id: "CVE-2023-20708",
   lastModified: "2025-01-24T20:15:28.243",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-15T22:15:11.033",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-1284",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2024-11-21 08:51
Summary
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566.",
      },
      {
         lang: "es",
         value: "En keyInstall, existe una posible escalada de privilegios debido a confusión de tipos. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS08358566; ID del problema: ALPS08358566.",
      },
   ],
   id: "CVE-2024-20012",
   lastModified: "2024-11-21T08:51:47.703",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-05T06:15:47.490",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-04 16:15
Modified
2024-11-21 06:41
Summary
In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:awus036nh:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23A5CF60-C9DD-487C-8ABA-325D7A73694F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC85BBB-5985-41A1-B19F-1C580C367B64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7662t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3331F3A6-E176-4EA5-B253-D5B03945C2B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10C79211-F064-499D-914E-0BACD038FBF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E400AB9-B82A-4449-8789-35112940270F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "739BE124-C307-41B2-8E92-C223FE67F88A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513.",
      },
      {
         lang: "es",
         value: "En Bluetooth, se presenta un posible bloqueo de la aplicación debido a que bluetooth no maneja apropiadamente la recepción de múltiples LMP_host_connection_req. Esto podría conllevar a una denegación de servicio remota de bluetooth sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06198513; ID de Incidencia: ALPS06198513",
      },
   ],
   id: "CVE-2022-20021",
   lastModified: "2024-11-21T06:41:57.907",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-04T16:15:10.600",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-06 18:15
Modified
2025-02-13 16:15
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589144.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8192:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "422634C7-D280-4664-AEE2-AA5B6723B836",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D09F23D-D023-4A60-B426-61251FDD8A5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8871:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1F80793-01B7-403A-A5F4-031F82FAC77A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C450B83A-913C-4E5B-B025-11071B6824D7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589144.",
      },
   ],
   id: "CVE-2023-20653",
   lastModified: "2025-02-13T16:15:37.793",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-04-06T18:15:08.407",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-01-03 21:15
Modified
2025-04-10 16:15
Summary
In meta wifi, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453594; Issue ID: ALPS07453594.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In meta wifi, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453594; Issue ID: ALPS07453594.",
      },
      {
         lang: "es",
         value: "En meta wifi, existe una posible lectura fuera de los límites debido a una verificación de límites faltantes. Esto podría conducir a una escalada local de privilegios con privilegios de ejecución del sistema necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS07453594; ID del problema: ALPS07453594.",
      },
   ],
   id: "CVE-2022-32641",
   lastModified: "2025-04-10T16:15:18.283",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-01-03T21:15:11.827",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 21:15
Modified
2024-11-21 06:45
Summary
In ion, there is a possible use after free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06371108; Issue ID: ALPS06371108.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26573298-76BC-49FE-8D99-CF03ED01B185",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ion, there is a possible use after free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06371108; Issue ID: ALPS06371108.",
      },
      {
         lang: "es",
         value: "En ion, se presenta un posible uso de memoria previamente liberada debido a un desbordamiento de enteros. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del parche: ALPS06371108; Issue ID: ALPS06371108",
      },
   ],
   id: "CVE-2022-21743",
   lastModified: "2024-11-21T06:45:21.157",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T21:15:09.347",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2024-11-21 08:04
Summary
In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308612; Issue ID: ALPS08308612.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308612; Issue ID: ALPS08308612.",
      },
      {
         lang: "es",
         value: "En keyInstall, existe una posible divulgación de información debido a una verificación de los límites faltantes. Esto podría conducir a la divulgación de información local con privilegios de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS08308612; ID del problema: ALPS08308612.",
      },
   ],
   id: "CVE-2023-32876",
   lastModified: "2024-11-21T08:04:15.130",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-02T03:15:07.937",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-06 18:15
Modified
2025-02-12 16:15
Summary
In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07460390.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D09F23D-D023-4A60-B426-61251FDD8A5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07460390.",
      },
   ],
   id: "CVE-2022-32599",
   lastModified: "2025-02-12T16:15:33.257",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-04-06T18:15:08.293",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017756.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017756.",
      },
   ],
   id: "CVE-2023-20780",
   lastModified: "2024-11-21T07:41:30.763",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-07T04:15:12.577",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-01-03 21:15
Modified
2025-04-10 16:15
Summary
In meta wifi, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441652; Issue ID: ALPS07441652.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "F120D280-287A-474F-9DC5-CBBC4B4C7237",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "16820CAF-0A8A-45C8-B5A8-979EA0407389",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In meta wifi, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441652; Issue ID: ALPS07441652.",
      },
      {
         lang: "es",
         value: "En meta wifi, existe una posible escritura fuera de los límites debido a una verificación de límites faltantes. Esto podría conducir a una escalada local de privilegios con privilegios de ejecución del sistema necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS07441652; ID del problema: ALPS07441652.",
      },
   ],
   id: "CVE-2022-32640",
   lastModified: "2025-04-10T16:15:18.027",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-01-03T21:15:11.777",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-02-06 20:15
Modified
2025-03-26 20:15
Summary
In ion, there is a possible out of bounds read due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560720; Issue ID: ALPS07560720.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ion, there is a possible out of bounds read due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560720; Issue ID: ALPS07560720.",
      },
   ],
   id: "CVE-2023-20616",
   lastModified: "2025-03-26T20:15:18.073",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-02-06T20:15:15.050",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 21:15
Summary
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628540.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628540.",
      },
   ],
   id: "CVE-2023-20742",
   lastModified: "2025-01-07T21:15:10.920",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-06-06T13:15:14.033",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C38B265-3EE8-417C-9D59-6182939ED27E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C04171-DB18-40D7-AFC5-04A869942396",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "455B256C-83C8-406F-B28F-A4205E7C094E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4FF926A-2D26-4666-ACA4-474A89243566",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8186:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4932D34-06F4-49D7-81FB-772A82E8A5B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "961C13C3-2C3D-46B1-A618-D45920EC5E95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62282860-5EAF-45EA-B36E-6B6F124C3096",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.",
      },
      {
         lang: "es",
         value: "En asf extractor, se presenta una posible lectura fuera de límites debido a un desbordamiento de enteros. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05489178; ID del Problema: ALPS05585817.",
      },
   ],
   id: "CVE-2021-0623",
   lastModified: "2024-11-21T05:43:02.290",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-18T15:15:08.280",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Summary
In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.",
      },
      {
         lang: "es",
         value: "En memory management driver, se presenta una posible corrupción de memoria debido a un desbordamiento de enteros. Esto podría conllevar una escalada local de privilegios sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID de parche: ALPS05403499; ID de Incidencia: ALPS05411456",
      },
   ],
   id: "CVE-2021-0610",
   lastModified: "2024-11-21T05:43:00.833",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.780",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-09-06 18:15
Modified
2024-11-21 06:53
Severity ?
Summary
In BT firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784478; Issue ID: ALPS06784478.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:yoctoproject:yocto:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "987749DE-6EE9-401A-B2D4-B1680CAD0376",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE5E73E0-EF8D-4659-B447-66474BC05708",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In BT firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784478; Issue ID: ALPS06784478.",
      },
      {
         lang: "es",
         value: "En BT firmware, es posible que se produzca una escritura fuera de límites debido a una falta de comprobación de límites. Esto podría conllevar a una ejecución de código remota sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06784478; ID de Incidencia: ALPS06784478.\n",
      },
   ],
   id: "CVE-2022-26447",
   lastModified: "2024-11-21T06:53:58.003",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-09-06T18:15:11.610",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2024-11-21 08:04
Summary
In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08304217.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08304217.",
      },
      {
         lang: "es",
         value: "En keyInstall, existe una posible divulgación de información debido a una verificación de los límites faltantes. Esto podría conducir a la divulgación de información local con privilegios de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS08308607; ID del problema: ALPS08304217.",
      },
   ],
   id: "CVE-2023-32875",
   lastModified: "2024-11-21T08:04:14.997",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-02T03:15:07.883",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-15 22:15
Modified
2025-01-24 19:15
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07576935; Issue ID: ALPS07576935.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07576935; Issue ID: ALPS07576935.",
      },
   ],
   id: "CVE-2023-20710",
   lastModified: "2025-01-24T19:15:11.013",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-15T22:15:11.113",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-1284",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C38B265-3EE8-417C-9D59-6182939ED27E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C04171-DB18-40D7-AFC5-04A869942396",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "455B256C-83C8-406F-B28F-A4205E7C094E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4FF926A-2D26-4666-ACA4-474A89243566",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8184:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF76BE8-E35C-470B-813D-5290F6B0D281",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "961C13C3-2C3D-46B1-A618-D45920EC5E95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62282860-5EAF-45EA-B36E-6B6F124C3096",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.",
      },
      {
         lang: "es",
         value: "En asf extractor, se presenta una posible lectura fuera de límites debido a un desbordamiento de enteros. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05489178; ID del Problema: ALPS05561383.",
      },
   ],
   id: "CVE-2021-0621",
   lastModified: "2024-11-21T05:43:02.060",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-18T15:15:08.163",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-04 16:15
Modified
2024-11-21 06:41
Summary
In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC85BBB-5985-41A1-B19F-1C580C367B64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7662t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3331F3A6-E176-4EA5-B253-D5B03945C2B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10C79211-F064-499D-914E-0BACD038FBF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E400AB9-B82A-4449-8789-35112940270F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "739BE124-C307-41B2-8E92-C223FE67F88A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578.",
      },
      {
         lang: "es",
         value: "En Bluetooth, se presenta una posible desconexión del enlace debido a que bluetooth no maneja apropiadamente un intento de conexión desde un host con la misma dirección BD que el host BT actualmente conectado. Esto podría conllevar a una denegación de servicio remota de bluetooth sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06198578; ID de Incidencia: ALPS06198578",
      },
   ],
   id: "CVE-2022-20022",
   lastModified: "2024-11-21T06:41:58.040",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-04T16:15:10.653",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07588667.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07588667.",
      },
   ],
   id: "CVE-2023-20753",
   lastModified: "2024-11-21T07:41:28.740",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-04T02:15:09.847",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8127:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD7BDC63-3963-4C4D-B547-2936006926E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8135:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "182A995C-2453-4DF2-ABCC-A885D8C334C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E5B22E8-3536-4DBC-8E71-3E14FE45A887",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8312c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "39915BEC-73D4-46B7-B52C-CED910AF3CA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8312d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EF828C6-4B05-4E12-9B78-782F1F062F39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8382:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4B7F410-9623-4878-AF8B-CB1E68B9C555",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8389:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61E84418-3D52-4C5B-919A-2C3EA3A20BC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8392:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2FE1D80-FBA8-452B-AAD1-A7BC430B44B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8392_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB784A7D-1B24-48FC-BC42-0F646BBD0B58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8665:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "367725BC-DE40-40F1-A59A-C4286CA9C0D2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FED17AD2-3B65-48EE-A56E-FEA4A5F38B8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8693:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA2890F-59A8-4CAB-BDFA-883F8A38CE4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A91F81E5-29D3-4BA7-9476-EBD644F7E4F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3FC505E-CF02-4F29-8D17-0E0C05433B0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8783:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2FD7E95-F0D4-492E-BB92-2597FB9D2884",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "584F2DD7-F353-4156-BFAB-AE6DF5BB9251",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556.",
      },
      {
         lang: "es",
         value: "En ged, se presenta una posible corrupción de memoria debido a un manejo de errores incorrecto. Esto podría conllevar a una divulgación de información local con los privilegios de ejecución System requeridos. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05838808; ID de Incidencia: ALPS05839556",
      },
   ],
   id: "CVE-2022-20076",
   lastModified: "2024-11-21T06:42:06.087",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-04-11T20:15:19.270",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-755",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-04 16:15
Modified
2024-11-21 06:41
Summary
In seninf driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863018; Issue ID: ALPS05863018.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In seninf driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863018; Issue ID: ALPS05863018.",
      },
      {
         lang: "es",
         value: "En el controlador seninf, se presenta una posible divulgación de información debido a datos no inicializados. Esto podría conllevar a una divulgación de información local con los privilegios de ejecución System requeridos. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05863018; ID de Incidencia: ALPS05863018",
      },
   ],
   id: "CVE-2022-20018",
   lastModified: "2024-11-21T06:41:57.493",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-04T16:15:10.440",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-908",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45A7A805-EFED-47B3-884C-158FF1EECAEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035",
      },
      {
         lang: "es",
         value: "En la aplicación Browser, existe una posible divulgación de información debido a la falta de comprobación de permisos. Esto podría conducir a la divulgación de información local sin necesidad de privilegios de ejecución adicionales. La interacción del usuario no es necesaria para la explotación.Producto: AndroidVersiones: Android SoCAndroid ID: A-199678035",
      },
   ],
   id: "CVE-2021-0672",
   lastModified: "2024-11-21T05:43:07.290",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-18T15:15:09.210",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://source.android.com/security/bulletin/2021-11-01",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://source.android.com/security/bulletin/2021-11-01",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-06-06 18:15
Modified
2024-11-21 06:45
Summary
In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058.",
      },
      {
         lang: "es",
         value: "En telephony, se presenta una posible divulgación de información debido a una falta de comprobación de permisos. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID de parche: ALPS06511058; ID de incidencia: ALPS06511058",
      },
   ],
   id: "CVE-2022-21749",
   lastModified: "2024-11-21T06:45:21.823",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-06-06T18:15:08.723",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2024-11-21 08:04
Summary
In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161825; Issue ID: MOLY01161825 (MSV-895).



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161825; Issue ID: MOLY01161825 (MSV-895).",
      },
      {
         lang: "es",
         value: "En Modem IMS Call UA, existe una posible escritura fuera de los límites debido a una verificación de límites faltantes. Esto podría provocar una denegación remota de servicio sin necesidad de privilegios de ejecución adicionales. La interacción del usuario no es necesaria para la explotación. ID de parche: MOLY01161825; ID del problema: MOLY01161825 (MSV-895).",
      },
   ],
   id: "CVE-2023-32889",
   lastModified: "2024-11-21T08:04:16.780",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-02T03:15:08.540",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550103.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550103.",
      },
   ],
   id: "CVE-2023-20782",
   lastModified: "2024-11-21T07:41:31.023",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-07T04:15:12.720",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 22:15
Summary
In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559819.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559819.",
      },
   ],
   id: "CVE-2023-20739",
   lastModified: "2025-01-07T22:15:28.793",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-06-06T13:15:13.590",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.",
      },
      {
         lang: "es",
         value: "En m4u, se presenta una posible corrupción de memoria debido a un uso de memoria previamente liberada. Esto podría conllevar a una escalada local de privilegios con los privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05425834",
      },
   ],
   id: "CVE-2021-0612",
   lastModified: "2024-11-21T05:43:01.063",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.867",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In ion, there is a possible out of bounds read due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560720; Issue ID: ALPS07559800.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ion, there is a possible out of bounds read due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560720; Issue ID: ALPS07559800.",
      },
   ],
   id: "CVE-2023-20768",
   lastModified: "2024-11-21T07:41:30.027",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-04T02:15:10.383",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-04 02:15
Modified
2024-11-21 07:41
Summary
In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openwrt:openwrt:21.02:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D36D1D8-C428-438F-A773-150B30A8EBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410.",
      },
   ],
   id: "CVE-2023-20775",
   lastModified: "2024-11-21T07:41:30.643",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-04T02:15:10.590",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/July-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C38B265-3EE8-417C-9D59-6182939ED27E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C04171-DB18-40D7-AFC5-04A869942396",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "455B256C-83C8-406F-B28F-A4205E7C094E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4FF926A-2D26-4666-ACA4-474A89243566",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "961C13C3-2C3D-46B1-A618-D45920EC5E95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62282860-5EAF-45EA-B36E-6B6F124C3096",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.",
      },
      {
         lang: "es",
         value: "En asf extractor, se presenta una posible lectura fuera de límites debido a un desbordamiento del búfer de la pila. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05489178; ID del Problema: ALPS05561381.",
      },
   ],
   id: "CVE-2021-0620",
   lastModified: "2024-11-21T05:43:01.937",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-18T15:15:08.100",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C38B265-3EE8-417C-9D59-6182939ED27E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C04171-DB18-40D7-AFC5-04A869942396",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "455B256C-83C8-406F-B28F-A4205E7C094E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4FF926A-2D26-4666-ACA4-474A89243566",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "961C13C3-2C3D-46B1-A618-D45920EC5E95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62282860-5EAF-45EA-B36E-6B6F124C3096",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.",
      },
      {
         lang: "es",
         value: "En asf extractor, se presenta una posible lectura fuera de límites debido a un desbordamiento del búfer de la pila. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05489178; ID del Problema: ALPS05561388.",
      },
   ],
   id: "CVE-2021-0622",
   lastModified: "2024-11-21T05:43:02.173",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-18T15:15:08.230",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-06 18:15
Modified
2025-03-17 19:15
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589148.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8192:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "422634C7-D280-4664-AEE2-AA5B6723B836",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D09F23D-D023-4A60-B426-61251FDD8A5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8871:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1F80793-01B7-403A-A5F4-031F82FAC77A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C450B83A-913C-4E5B-B025-11071B6824D7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589148.",
      },
   ],
   id: "CVE-2023-20654",
   lastModified: "2025-03-17T19:15:15.450",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-04-06T18:15:08.453",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26573298-76BC-49FE-8D99-CF03ED01B185",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877.",
      },
      {
         lang: "es",
         value: "En netdiag, se presenta un posible seguimiento de enlaces simbólicos debido a una resolución de enlaces inapropiada. Esto podría conllevar a una escalada de privilegios local con privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID de parche: ALPS06308877; ID de Incidencia: ALPS06308877",
      },
   ],
   id: "CVE-2022-20085",
   lastModified: "2024-11-21T06:42:07.307",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T20:15:08.237",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-59",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.",
      },
      {
         lang: "es",
         value: "En memory management driver, se presenta una posible divulgación de información debido a una falta de comprobación de límites. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05381235",
      },
   ],
   id: "CVE-2021-0421",
   lastModified: "2024-11-21T05:42:41.473",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.560",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-120",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-03-07 21:15
Modified
2025-03-06 17:15
Summary
In ion, there is a possible escalation of privilege due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559778; Issue ID: ALPS07559778.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:yoctoproject:yocto:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "987749DE-6EE9-401A-B2D4-B1680CAD0376",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:yoctoproject:yocto:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC506285-78EF-47B7-A990-FB7D2ED20885",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:yoctoproject:yocto:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "00D1586A-C49F-4655-8AC4-F4096B679869",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ion, there is a possible escalation of privilege due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559778; Issue ID: ALPS07559778.",
      },
   ],
   id: "CVE-2023-20623",
   lastModified: "2025-03-06T17:15:15.163",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.5,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.5,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-03-07T21:15:10.447",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-367",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-367",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-15 22:15
Modified
2025-01-24 20:15
Summary
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628556; Issue ID: ALPS07628556.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628556; Issue ID: ALPS07628556.",
      },
   ],
   id: "CVE-2023-20707",
   lastModified: "2025-01-24T20:15:28.073",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-15T22:15:10.993",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-1284",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:42
Summary
In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705.",
      },
      {
         lang: "es",
         value: "En ion driver, se presenta una posible divulgación de información debido a una comprobación de límites incorrecta. Esto podría conllevar a una divulgación de información local remota sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06171705; ID de Incidencia: ALPS06171705",
      },
   ],
   id: "CVE-2022-20037",
   lastModified: "2024-11-21T06:42:00.093",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-02-09T23:15:17.393",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-04 16:15
Modified
2024-11-21 06:41
Summary
In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.",
      },
      {
         lang: "es",
         value: "En libMtkOmxGsmDec, se presenta una posible divulgación de información debido a una comprobación de límites incorrecta. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05917620; ID de Incidencia: ALPS05917620",
      },
   ],
   id: "CVE-2022-20019",
   lastModified: "2024-11-21T06:41:57.627",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-04T16:15:10.493",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.",
      },
      {
         lang: "es",
         value: "En m4u, se presenta una posible corrupción de memoria debido a un uso de memoria previamente liberada. Esto podría conllevar una escalada local de privilegios con los privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05425810",
      },
   ],
   id: "CVE-2021-0611",
   lastModified: "2024-11-21T05:43:00.947",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.823",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-03-07 21:15
Modified
2025-03-05 19:15
Summary
In keyinstall, there is a possible information disclosure due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07563028.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible information disclosure due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07563028.",
      },
   ],
   id: "CVE-2023-20635",
   lastModified: "2025-03-05T19:15:27.790",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-03-07T21:15:11.020",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-191",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-191",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.",
      },
      {
         lang: "es",
         value: "En memory management driver, es posible que se produzca un bloqueo del sistema debido a una falta de comprobación de límites. Esto podría conllevar a una denegación de servicio local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05381071",
      },
   ],
   id: "CVE-2021-0422",
   lastModified: "2024-11-21T05:42:41.623",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.607",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-06-06 18:15
Modified
2024-11-21 06:45
Summary
In ccu, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06439600; Issue ID: ALPS06439600.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ccu, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06439600; Issue ID: ALPS06439600.",
      },
      {
         lang: "es",
         value: "En ccu, se presenta una posible corrupción de memoria debido a una doble liberación. Esto podría conllevar a una escalada local de privilegios con los privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06439600; ID de Incidencia: ALPS06439600",
      },
   ],
   id: "CVE-2022-21758",
   lastModified: "2024-11-21T06:45:22.887",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-06-06T18:15:09.100",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-415",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS07905323.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS07905323.",
      },
   ],
   id: "CVE-2023-20781",
   lastModified: "2024-11-21T07:41:30.893",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-07T04:15:12.647",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26573298-76BC-49FE-8D99-CF03ED01B185",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915.",
      },
      {
         lang: "es",
         value: "En ion, se presenta un posible uso de memoria previamente liberada debido a la actualización inapropiada del recuento de referencias. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06399915; ID de Incidencia: ALPS06399915",
      },
   ],
   id: "CVE-2022-20109",
   lastModified: "2024-11-21T06:42:10.453",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T20:15:08.870",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-06 18:15
Modified
2025-02-12 16:15
Summary
In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441821; Issue ID: ALPS07441821.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt2715:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA252F20-1BB7-4654-972C-F257F37396A7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8169:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5375050-4568-4919-BFE3-A72E1C7E65A2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA3D4A45-38EE-4125-AE67-89D1C707F95A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8192:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "422634C7-D280-4664-AEE2-AA5B6723B836",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B774B7D7-B7DD-43A0-833F-7E39DF82CA60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26573298-76BC-49FE-8D99-CF03ED01B185",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D09F23D-D023-4A60-B426-61251FDD8A5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C450B83A-913C-4E5B-B025-11071B6824D7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441821; Issue ID: ALPS07441821.",
      },
   ],
   id: "CVE-2023-20688",
   lastModified: "2025-02-12T16:15:36.617",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-04-06T18:15:09.810",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-01-03 21:15
Modified
2025-04-10 17:15
Summary
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07510064.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07510064; Issue ID: ALPS07510064.",
      },
      {
         lang: "es",
         value: "En keyinstall, existe una posible escritura fuera de los límites debido a un desbordamiento de enteros. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS07510064; ID del problema: ALPS07510064.",
      },
   ],
   id: "CVE-2022-32636",
   lastModified: "2025-04-10T17:15:33.090",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-01-03T21:15:11.587",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-02-06 20:15
Modified
2025-03-26 14:15
Summary
In gpu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588678; Issue ID: ALPS07588678.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In gpu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588678; Issue ID: ALPS07588678.",
      },
   ],
   id: "CVE-2023-20611",
   lastModified: "2025-03-26T14:15:27.513",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.5,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.5,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-02-06T20:15:14.817",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-662",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-662",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.",
      },
      {
         lang: "es",
         value: "En telephony, es posible que sea deshabilitada la recepción de transmisiones de emergencia debido a una falta de comprobación de permisos. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06498874; ID de Incidencia: ALPS06498874",
      },
   ],
   id: "CVE-2022-20084",
   lastModified: "2024-11-21T06:42:07.160",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T20:15:08.197",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-06 18:15
Modified
2025-02-13 16:15
Summary
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589135.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8192:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "422634C7-D280-4664-AEE2-AA5B6723B836",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D09F23D-D023-4A60-B426-61251FDD8A5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8871:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1F80793-01B7-403A-A5F4-031F82FAC77A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C450B83A-913C-4E5B-B025-11071B6824D7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589135.",
      },
   ],
   id: "CVE-2023-20652",
   lastModified: "2025-02-13T16:15:37.597",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-04-06T18:15:08.353",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 21:15
Modified
2024-11-21 06:42
Summary
In ion, there is a possible use after free due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06366069; Issue ID: ALPS06366069.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26573298-76BC-49FE-8D99-CF03ED01B185",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ion, there is a possible use after free due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06366069; Issue ID: ALPS06366069.",
      },
      {
         lang: "es",
         value: "En ion, se presenta un posible uso de memoria previamente liberada debido a un manejo incorrecto de errores. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del parche: ALPS06366069; ID de Incidencia: ALPS06366069",
      },
   ],
   id: "CVE-2022-20111",
   lastModified: "2024-11-21T06:42:10.733",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 8.4,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.5,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T21:15:09.300",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-755",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-06-06 18:15
Modified
2024-11-21 06:45
Summary
In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26573298-76BC-49FE-8D99-CF03ED01B185",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.",
      },
      {
         lang: "es",
         value: "En WLAN driver, se presenta una posible lectura fuera de límites debido a una comprobación de límites incorrecta. Esto podría conllevar a una divulgación de información local con los privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06545464; ID de incidencia: ALPS06545464",
      },
   ],
   id: "CVE-2022-21755",
   lastModified: "2024-11-21T06:45:22.530",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-06-06T18:15:08.973",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-12-05 15:15
Modified
2025-04-24 15:15
Summary
In keyinstall, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07439659; Issue ID: ALPS07439659.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07439659; Issue ID: ALPS07439659.",
      },
      {
         lang: "es",
         value: "En keyinstall, existe una posible escritura fuera de los límites debido a una verificación de los límites incorrecta. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS07439659; ID del problema: ALPS07439659.",
      },
   ],
   id: "CVE-2022-32619",
   lastModified: "2025-04-24T15:15:45.257",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2022-12-05T15:15:17.940",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/December-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/December-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 21:15
Summary
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628606.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628606.",
      },
   ],
   id: "CVE-2023-20741",
   lastModified: "2025-01-07T21:15:10.730",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-06-06T13:15:13.873",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.",
      },
      {
         lang: "es",
         value: "En ssmr, se presenta una posible escritura fuera de límites debido a una falta de comprobación de límites. Esto podría conllevar a una escalada local de privilegios con los privilegios de ejecución System requeridos. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06362920; ID de Incidencia: ALPS06362920",
      },
   ],
   id: "CVE-2022-20070",
   lastModified: "2024-11-21T06:42:04.710",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-04-11T20:15:19.033",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.",
      },
      {
         lang: "es",
         value: "En memory management driver, es posible que se produzca un bloqueo del sistema debido a una falta de comprobación de límites. Esto podría conllevar a una denegación de servicio local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05393787",
      },
   ],
   id: "CVE-2021-0424",
   lastModified: "2024-11-21T05:42:41.887",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.693",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.",
      },
      {
         lang: "es",
         value: "En telephony, es posible que sea deshabilitada la recepción de mensajes SMS debido a una falta de comprobación de permisos. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06498868; ID de Incidencia: ALPS06498868",
      },
   ],
   id: "CVE-2022-20093",
   lastModified: "2024-11-21T06:42:08.273",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T20:15:08.530",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-15 22:15
Modified
2025-01-24 19:15
Summary
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581668; Issue ID: ALPS07581668.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581668; Issue ID: ALPS07581668.",
      },
   ],
   id: "CVE-2023-20711",
   lastModified: "2025-01-24T19:15:11.540",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-15T22:15:11.150",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-12-17 17:15
Modified
2024-11-21 05:43
Summary
In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6570:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "975802CC-B130-4CF3-9B8E-A23DEA464259",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E5B22E8-3536-4DBC-8E71-3E14FE45A887",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237.",
      },
      {
         lang: "es",
         value: "En el descodificador alac, se presenta una posible lectura fuera de límites debido a una comprobación de límites incorrecta. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06064258; ID de Incidencia: ALPS06064237",
      },
   ],
   id: "CVE-2021-0674",
   lastModified: "2024-11-21T05:43:07.547",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-12-17T17:15:10.793",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/December-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/December-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Summary
In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.",
      },
      {
         lang: "es",
         value: "En ims service, se presenta un posible comportamiento no esperado de la aplicación debido a una asignación de privilegios incorrecta. Esto podría conllevar a una denegación de servicio local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del parche: ALPS06219127; ID de Incidencia: ALPS06219127",
      },
   ],
   id: "CVE-2022-20051",
   lastModified: "2024-11-21T06:42:02.073",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-03-10T17:45:04.063",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-269",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2024-11-21 08:04
Summary
In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08308607.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08308607.",
      },
      {
         lang: "es",
         value: "En keyInstall, existe una posible escritura fuera de los límites debido a una verificación de los límites faltantes. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS08308607; ID del problema: ALPS08308607.",
      },
   ],
   id: "CVE-2023-32872",
   lastModified: "2024-11-21T08:04:14.590",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-02T03:15:07.790",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/January-2024",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In ion, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399901.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26573298-76BC-49FE-8D99-CF03ED01B185",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ion, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399901.",
      },
      {
         lang: "es",
         value: "En ion, se presenta un posible uso de memoria previamente liberada debido a una condición de carrera. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06399915; ID de Incidencia: ALPS06399901",
      },
   ],
   id: "CVE-2022-20110",
   lastModified: "2024-11-21T06:42:10.590",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T20:15:08.917",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-367",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017764.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017764.",
      },
      {
         lang: "es",
         value: "En keyinstall, existe una posible divulgación de información debido a una comprobación de límites omitida. Esto podría conducir a la divulgación de información local con privilegios de ejecución del sistema necesarios. No es necesaria la interacción del usuario para su explotación. ID del parche: ALPS08017756; ID de la incidencia: ALPS08017764.",
      },
   ],
   id: "CVE-2023-20833",
   lastModified: "2024-11-21T07:41:38.973",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-09-04T03:15:10.010",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:41
Summary
In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.",
      },
      {
         lang: "es",
         value: "En fb driver, se presenta una posible corrupción de memoria debido a un uso de memoria previamente liberada. Esto podría conllevar a una escalada local de privilegios remota sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05850708; ID de Incidencia: ALPS05850708",
      },
   ],
   id: "CVE-2022-20031",
   lastModified: "2024-11-21T06:41:59.210",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-02-09T23:15:17.157",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}