Vulnerabilites related to mediatek - mt6732
Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Severity ?
Summary
In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*", matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*", matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*", matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*", matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*", matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*", matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*", matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*", matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*", matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*", matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*", matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*", matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.", }, { lang: "es", value: "En memory management driver, se presenta una posible divulgación de información de canal lateral. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05400059", }, ], id: "CVE-2021-0425", lastModified: "2024-11-21T05:42:42.010", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-27T12:15:07.737", references: [ { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Severity ?
Summary
In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*", matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*", matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*", matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*", matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*", matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*", matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*", matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*", matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*", matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*", matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*", matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*", matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.", }, { lang: "es", value: "En memory management driver, se presenta una posible divulgación de información debido a datos no inicializados. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05385714", }, ], id: "CVE-2021-0423", lastModified: "2024-11-21T05:42:41.757", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-27T12:15:07.650", references: [ { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-665", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Severity ?
Summary
In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.", }, { lang: "es", value: "En telephony, es posible que sea deshabilitada la recepción de transmisiones de emergencia debido a una falta de comprobación de permisos. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06498874; ID de Incidencia: ALPS06498874", }, ], id: "CVE-2022-20084", lastModified: "2024-11-21T06:42:07.160", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-03T20:15:08.197", references: [ { source: "security@mediatek.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/May-2022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/May-2022", }, ], sourceIdentifier: "security@mediatek.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-862", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-06-06 18:15
Modified
2024-11-21 06:45
Severity ?
Summary
In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*", matchCriteriaId: "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*", matchCriteriaId: "26573298-76BC-49FE-8D99-CF03ED01B185", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.", }, { lang: "es", value: "En WLAN driver, se presenta una posible lectura fuera de límites debido a una comprobación de límites incorrecta. Esto podría conllevar a una divulgación de información local con los privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06545464; ID de incidencia: ALPS06545464", }, ], id: "CVE-2022-21755", lastModified: "2024-11-21T06:45:22.530", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-06-06T18:15:08.973", references: [ { source: "security@mediatek.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/June-2022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/June-2022", }, ], sourceIdentifier: "security@mediatek.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Severity ?
Summary
In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*", matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*", matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*", matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*", matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*", matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*", matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*", matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*", matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*", matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*", matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*", matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*", matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.", }, { lang: "es", value: "En memory management driver, se presenta una posible corrupción de memoria debido a un desbordamiento de enteros. Esto podría conllevar una escalada local de privilegios sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID de parche: ALPS05403499; ID de Incidencia: ALPS05411456", }, ], id: "CVE-2021-0610", lastModified: "2024-11-21T05:43:00.833", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-27T12:15:07.780", references: [ { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Severity ?
Summary
In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
android | 11.0 | ||
android | 12.0 | ||
mediatek | mt6731 | - | |
mediatek | mt6732 | - | |
mediatek | mt6735 | - | |
mediatek | mt6737 | - | |
mediatek | mt6739 | - | |
mediatek | mt6750 | - | |
mediatek | mt6750s | - | |
mediatek | mt6752 | - | |
mediatek | mt6753 | - | |
mediatek | mt6755 | - | |
mediatek | mt6755s | - | |
mediatek | mt6757 | - | |
mediatek | mt6757c | - | |
mediatek | mt6757cd | - | |
mediatek | mt6757ch | - | |
mediatek | mt6758 | - | |
mediatek | mt6761 | - | |
mediatek | mt6762 | - | |
mediatek | mt6763 | - | |
mediatek | mt6765 | - | |
mediatek | mt6768 | - | |
mediatek | mt6769 | - | |
mediatek | mt6771 | - | |
mediatek | mt6779 | - | |
mediatek | mt6781 | - | |
mediatek | mt6785 | - | |
mediatek | mt6789 | - | |
mediatek | mt6795 | - | |
mediatek | mt6797 | - | |
mediatek | mt6799 | - | |
mediatek | mt6833 | - | |
mediatek | mt6853 | - | |
mediatek | mt6853t | - | |
mediatek | mt6873 | - | |
mediatek | mt6875 | - | |
mediatek | mt6877 | - | |
mediatek | mt6879 | - | |
mediatek | mt6880 | - | |
mediatek | mt6883 | - | |
mediatek | mt6885 | - | |
mediatek | mt6889 | - | |
mediatek | mt6890 | - | |
mediatek | mt6891 | - | |
mediatek | mt6893 | - | |
mediatek | mt6895 | - | |
mediatek | mt6983 | - | |
mediatek | mt6985 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.", }, { lang: "es", value: "En ssmr, se presenta una posible escritura fuera de límites debido a una falta de comprobación de límites. Esto podría conllevar a una escalada local de privilegios con los privilegios de ejecución System requeridos. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06362920; ID de Incidencia: ALPS06362920", }, ], id: "CVE-2022-20070", lastModified: "2024-11-21T06:42:04.710", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-04-11T20:15:19.033", references: [ { source: "security@mediatek.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/April-2022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/April-2022", }, ], sourceIdentifier: "security@mediatek.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Severity ?
Summary
In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*", matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*", matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*", matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*", matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*", matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*", matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*", matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*", matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*", matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*", matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*", matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*", matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.", }, { lang: "es", value: "En memory management driver, se presenta una posible divulgación de información debido a una falta de comprobación de límites. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05381235", }, ], id: "CVE-2021-0421", lastModified: "2024-11-21T05:42:41.473", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-27T12:15:07.560", references: [ { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Severity ?
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*", matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*", matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*", matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*", matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*", matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*", matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*", matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*", matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*", matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*", matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*", matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*", matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.", }, { lang: "es", value: "En memory management driver, es posible que se produzca un bloqueo del sistema debido a una falta de comprobación de límites. Esto podría conllevar a una denegación de servicio local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05393787", }, ], id: "CVE-2021-0424", lastModified: "2024-11-21T05:42:41.887", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-27T12:15:07.693", references: [ { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-770", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Severity ?
Summary
In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.", }, { lang: "es", value: "En telephony, es posible que sea deshabilitada la recepción de mensajes SMS debido a una falta de comprobación de permisos. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06498868; ID de Incidencia: ALPS06498868", }, ], id: "CVE-2022-20093", lastModified: "2024-11-21T06:42:08.273", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-03T20:15:08.530", references: [ { source: "security@mediatek.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/May-2022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/May-2022", }, ], sourceIdentifier: "security@mediatek.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-862", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Severity ?
Summary
In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.", }, { lang: "es", value: "En ims service, se presenta un posible comportamiento no esperado de la aplicación debido a una asignación de privilegios incorrecta. Esto podría conllevar a una denegación de servicio local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del parche: ALPS06219127; ID de Incidencia: ALPS06219127", }, ], id: "CVE-2022-20051", lastModified: "2024-11-21T06:42:02.073", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-03-10T17:45:04.063", references: [ { source: "security@mediatek.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/March-2022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/March-2022", }, ], sourceIdentifier: "security@mediatek.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-269", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-10-02 03:15
Modified
2024-11-21 07:41
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEBC79B-E936-4499-8B2D-C6619C51B755", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*", matchCriteriaId: "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*", matchCriteriaId: "12318A0A-16CD-48A5-98A4-373070734642", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*", matchCriteriaId: "E30A2D2E-6A72-4070-A471-EEE75F7D07F2", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*", matchCriteriaId: "2B763B71-F913-45B4-B91E-D7F0670C4315", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*", matchCriteriaId: "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*", matchCriteriaId: "6528FA05-C8B7-498B-93BE-0BEFED28C1FB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6570:-:*:*:*:*:*:*:*", matchCriteriaId: "975802CC-B130-4CF3-9B8E-A23DEA464259", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*", matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737m:-:*:*:*:*:*:*:*", matchCriteriaId: "8E3152A6-982E-415E-9F19-1CB2F6D11850", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6738:-:*:*:*:*:*:*:*", matchCriteriaId: "99735131-D437-40AA-9EDB-31DC61DD15DF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*", matchCriteriaId: "160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*", matchCriteriaId: "0002C537-4268-43CA-B349-BC14F1F0313C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*", matchCriteriaId: "AE80B083-D5A3-418C-9655-C79C9DECB4C5", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*", matchCriteriaId: "3367BA13-9C4D-4CCF-8E71-397F33CFF773", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*", matchCriteriaId: "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*", matchCriteriaId: "BA1BE913-70AE-49FE-99E9-E996165DF79D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*", matchCriteriaId: "C387CFFD-BAE4-4626-8AC3-7C9CFB6819FB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*", matchCriteriaId: "F2C8F9C2-6471-4498-B089-2F40D2483487", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*", matchCriteriaId: "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*", matchCriteriaId: "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*", matchCriteriaId: "B7122918-8C44-4F24-82E4-B8448247FC83", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*", matchCriteriaId: "F883C6D3-1724-4553-9EFC-3D204FF3CAA3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*", matchCriteriaId: "855A8046-34ED-4891-ACE5-76AB10AC8D53", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*", matchCriteriaId: "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*", matchCriteriaId: "33DEF766-EAF1-4E36-BB7C-43069B26507A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*", matchCriteriaId: "2A7D8055-F4B6-41EE-A078-11D56285AB66", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", matchCriteriaId: "AD7DE6B2-66D9-4A3E-B15F-D56505559255", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*", matchCriteriaId: "CF649E18-4DA8-4724-A9B2-575BC01BFACC", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8766z:-:*:*:*:*:*:*:*", matchCriteriaId: "8F25CBBB-B600-4A54-8653-4C60CD125353", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768a:-:*:*:*:*:*:*:*", matchCriteriaId: "D039235C-D84C-4E9B-9D01-16A24E95FE79", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768b:-:*:*:*:*:*:*:*", matchCriteriaId: "4D99E26E-A551-428C-90FF-0F6CDE28C1A1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768t:-:*:*:*:*:*:*:*", matchCriteriaId: "21CA41B1-2BAF-43DE-AD79-396FA5125695", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768z:-:*:*:*:*:*:*:*", matchCriteriaId: "02B6E7E0-8BD2-4BA1-948F-3F5A95B989F5", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788t:-:*:*:*:*:*:*:*", matchCriteriaId: "0165F48B-B11A-4A8B-859B-083D239270FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788x:-:*:*:*:*:*:*:*", matchCriteriaId: "F4DE760A-BF65-4917-B571-1382C6703271", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788z:-:*:*:*:*:*:*:*", matchCriteriaId: "5CE75D73-582B-48BF-B38A-3F9626338C7D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.", }, { lang: "es", value: "En el CDMA PPP protocol, existe una posible escritura fuera de límites debido a una verificación de límites faltantes. Esto podría conducir a una escalada remota de privilegios sin necesidad de privilegios de ejecución adicionales. La interacción del usuario no es necesaria para la explotación. ID de parche: MOLY01068234; ID del problema: ALPS08010003.", }, ], id: "CVE-2023-20819", lastModified: "2024-11-21T07:41:36.283", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-10-02T03:15:09.710", references: [ { source: "security@mediatek.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/October-2023", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/October-2023", }, ], sourceIdentifier: "security@mediatek.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Severity ?
Summary
In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*", matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*", matchCriteriaId: "45A7A805-EFED-47B3-884C-158FF1EECAEC", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.", }, { lang: "es", value: "En mobile_log_d, se presenta un posible seguimiento de enlaces simbólicos debido a una resolución de enlaces inapropiada. Esto podría conllevar a una escalada local de privilegios con los privilegios de ejecución System requeridos. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06308907; ID de Incidencia: ALPS06308907", }, ], id: "CVE-2022-20068", lastModified: "2024-11-21T06:42:04.427", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-04-11T20:15:18.957", references: [ { source: "security@mediatek.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/April-2022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/April-2022", }, ], sourceIdentifier: "security@mediatek.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-59", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Severity ?
Summary
In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.", }, { lang: "es", value: "En ims service, se presenta una posible escalada de privilegios debido a una falta de comprobación de permisos. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del parche: ALPS06219097; ID de Incidencia: ALPS06219097", }, ], id: "CVE-2022-20053", lastModified: "2024-11-21T06:42:02.353", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-03-10T17:45:04.477", references: [ { source: "security@mediatek.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/March-2022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/March-2022", }, ], sourceIdentifier: "security@mediatek.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-862", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Severity ?
Summary
In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", matchCriteriaId: "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*", matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*", matchCriteriaId: "45A7A805-EFED-47B3-884C-158FF1EECAEC", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035", }, { lang: "es", value: "En la aplicación Browser, existe una posible divulgación de información debido a la falta de comprobación de permisos. Esto podría conducir a la divulgación de información local sin necesidad de privilegios de ejecución adicionales. La interacción del usuario no es necesaria para la explotación.Producto: AndroidVersiones: Android SoCAndroid ID: A-199678035", }, ], id: "CVE-2021-0672", lastModified: "2024-11-21T05:43:07.290", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-18T15:15:09.210", references: [ { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/2021-11-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/2021-11-01", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-862", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Severity ?
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*", matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*", matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*", matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*", matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*", matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*", matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*", matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*", matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*", matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*", matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*", matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*", matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.", }, { lang: "es", value: "En m4u, se presenta una posible corrupción de memoria debido a un uso de memoria previamente liberada. Esto podría conllevar una escalada local de privilegios con los privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05425810", }, ], id: "CVE-2021-0611", lastModified: "2024-11-21T05:43:00.947", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-27T12:15:07.823", references: [ { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Severity ?
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*", matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*", matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*", matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*", matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*", matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*", matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*", matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*", matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*", matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*", matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*", matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*", matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.", }, { lang: "es", value: "En memory management driver, es posible que se produzca un bloqueo del sistema debido a una falta de comprobación de límites. Esto podría conllevar a una denegación de servicio local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05381071", }, ], id: "CVE-2021-0422", lastModified: "2024-11-21T05:42:41.623", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-27T12:15:07.607", references: [ { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-770", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:41
Severity ?
Summary
In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*", matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*", matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*", matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*", matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*", matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*", matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*", matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*", matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*", matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*", matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*", matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*", matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.", }, { lang: "es", value: "En fb driver, se presenta una posible corrupción de memoria debido a un uso de memoria previamente liberada. Esto podría conllevar a una escalada local de privilegios remota sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05850708; ID de Incidencia: ALPS05850708", }, ], id: "CVE-2022-20031", lastModified: "2024-11-21T06:41:59.210", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-09T23:15:17.157", references: [ { source: "security@mediatek.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/February-2022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/February-2022", }, ], sourceIdentifier: "security@mediatek.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Severity ?
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*", matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*", matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*", matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*", matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*", matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*", matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*", matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*", matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*", matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*", matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*", matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*", matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.", }, { lang: "es", value: "En m4u, se presenta una posible corrupción de memoria debido a un uso de memoria previamente liberada. Esto podría conllevar a una escalada local de privilegios con los privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05425834", }, ], id: "CVE-2021-0612", lastModified: "2024-11-21T05:43:01.063", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-27T12:15:07.867", references: [ { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2021-0422
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
EPSS score ?
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/September-2021 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:40:01.116Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", vendor: "n/a", versions: [ { status: "affected", version: "Android 10.0, 11.0", }, ], }, ], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-27T11:20:27", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-0422", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", version: { version_data: [ { version_value: "Android 10.0, 11.0", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/September-2021", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2021-0422", datePublished: "2021-09-27T11:20:27", dateReserved: "2020-11-06T00:00:00", dateUpdated: "2024-08-03T15:40:01.116Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20031
Vulnerability from cvelistv5
Published
2022-02-09 22:05
Modified
2024-08-03 01:55
Severity ?
EPSS score ?
Summary
In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/February-2022 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T01:55:46.099Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/February-2022", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", vendor: "MediaTek, Inc.", versions: [ { status: "affected", version: "Android 10.0, 11.0", }, ], }, ], descriptions: [ { lang: "en", value: "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-09T22:05:36", orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", shortName: "MediaTek", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/February-2022", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mediatek.com", ID: "CVE-2022-20031", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", version: { version_data: [ { version_value: "Android 10.0, 11.0", }, ], }, }, ], }, vendor_name: "MediaTek, Inc.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/February-2022", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/February-2022", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", assignerShortName: "MediaTek", cveId: "CVE-2022-20031", datePublished: "2022-02-09T22:05:36", dateReserved: "2021-10-12T00:00:00", dateUpdated: "2024-08-03T01:55:46.099Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20819
Vulnerability from cvelistv5
Published
2023-10-02 02:05
Modified
2024-09-21 15:27
Severity ?
EPSS score ?
Summary
In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.
References
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:14:40.994Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/October-2023", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt2731", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6570:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6570", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6580", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6595", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6732", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6735", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6737", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6737m:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6737m", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6738:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6738", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6739", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6750", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6750s", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6752", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6753", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6755", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6757", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6758", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6761", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6762", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6762d", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6762m", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6763", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6765", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6765t", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6767", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6768", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6769", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6769t", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6769z", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6771", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6775", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6779", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6781", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6783", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6785", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6785t", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6789", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6795", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6797", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6799", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6813", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6815", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6833", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6835", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6853", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6855", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6873", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6875", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6875t", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6877", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6878", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6879", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6883", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6885", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6886", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6889", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6891", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6893", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6895", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6895t", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6896", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6897", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6983", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6985", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt6989", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8666", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8666a", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8667", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8673", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8675", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8765", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8766", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8766z:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8766z", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8768", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8768a:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8768a", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8768b:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8768b", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8768t:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8768t", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8768z:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8768z", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8781", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8786", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8788", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8788t:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8788t", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8788x:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8788x", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8788z:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8788z", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8791", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8791t", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8797", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mt8798", vendor: "mediatek", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-20819", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-21T15:26:25.287276Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-787", description: "CWE-787 Out-of-bounds Write", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-21T15:27:05.080Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "MT2731, MT6570, MT6580, MT6595, MT6732, MT6735, MT6737, MT6737M, MT6738, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6757, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6795, MT6797, MT6799, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6983, MT6985, MT6989, MT8666, MT8666A, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766Z, MT8768, MT8768A, MT8768B, MT8768T, MT8768Z, MT8781, MT8786, MT8788, MT8788T, MT8788X, MT8788Z, MT8791, MT8791T, MT8797, MT8798", vendor: "MediaTek, Inc.", versions: [ { status: "affected", version: "Modem LR11, LR12A, LR13, NR15, NR16, NR17", }, ], }, ], descriptions: [ { lang: "en", value: "In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-02T02:05:25.077Z", orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", shortName: "MediaTek", }, references: [ { url: "https://corp.mediatek.com/product-security-bulletin/October-2023", }, ], }, }, cveMetadata: { assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", assignerShortName: "MediaTek", cveId: "CVE-2023-20819", datePublished: "2023-10-02T02:05:25.077Z", dateReserved: "2022-10-28T02:03:23.673Z", dateUpdated: "2024-09-21T15:27:05.080Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-0612
Vulnerability from cvelistv5
Published
2021-09-27 11:21
Modified
2024-08-03 15:47
Severity ?
EPSS score ?
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/September-2021 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:47:27.962Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", vendor: "n/a", versions: [ { status: "affected", version: "Android 10.0, 11.0", }, ], }, ], descriptions: [ { lang: "en", value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-27T11:21:03", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-0612", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", version: { version_data: [ { version_value: "Android 10.0, 11.0", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/September-2021", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2021-0612", datePublished: "2021-09-27T11:21:03", dateReserved: "2020-11-06T00:00:00", dateUpdated: "2024-08-03T15:47:27.962Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-0672
Vulnerability from cvelistv5
Published
2021-11-18 14:54
Modified
2024-08-03 15:47
Severity ?
EPSS score ?
Summary
In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035
References
▼ | URL | Tags |
---|---|---|
https://source.android.com/security/bulletin/2021-11-01 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:47:28.235Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://source.android.com/security/bulletin/2021-11-01", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Android", vendor: "n/a", versions: [ { status: "affected", version: "Android SoC", }, ], }, ], descriptions: [ { lang: "en", value: "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035", }, ], problemTypes: [ { descriptions: [ { description: "Information disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-15T18:05:34", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://source.android.com/security/bulletin/2021-11-01", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-0672", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Android", version: { version_data: [ { version_value: "Android SoC", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://source.android.com/security/bulletin/2021-11-01", refsource: "MISC", url: "https://source.android.com/security/bulletin/2021-11-01", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2021-0672", datePublished: "2021-11-18T14:54:11", dateReserved: "2020-11-06T00:00:00", dateUpdated: "2024-08-03T15:47:28.235Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-0423
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
EPSS score ?
Summary
In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/September-2021 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:40:01.118Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", vendor: "n/a", versions: [ { status: "affected", version: "Android 10.0, 11.0", }, ], }, ], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-27T11:20:33", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-0423", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", version: { version_data: [ { version_value: "Android 10.0, 11.0", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/September-2021", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2021-0423", datePublished: "2021-09-27T11:20:33", dateReserved: "2020-11-06T00:00:00", dateUpdated: "2024-08-03T15:40:01.118Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-21755
Vulnerability from cvelistv5
Published
2022-06-06 17:39
Modified
2024-08-03 02:53
Severity ?
EPSS score ?
Summary
In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/June-2022 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:53:36.244Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/June-2022", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8667, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797", vendor: "MediaTek, Inc.", versions: [ { status: "affected", version: "Android 11.0, 12.0", }, ], }, ], descriptions: [ { lang: "en", value: "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-06-06T17:39:06", orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", shortName: "MediaTek", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/June-2022", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mediatek.com", ID: "CVE-2022-21755", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8667, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797", version: { version_data: [ { version_value: "Android 11.0, 12.0", }, ], }, }, ], }, vendor_name: "MediaTek, Inc.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/June-2022", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/June-2022", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", assignerShortName: "MediaTek", cveId: "CVE-2022-21755", datePublished: "2022-06-06T17:39:06", dateReserved: "2021-11-26T00:00:00", dateUpdated: "2024-08-03T02:53:36.244Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-0425
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
EPSS score ?
Summary
In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/September-2021 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:40:01.056Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", vendor: "n/a", versions: [ { status: "affected", version: "Android 10.0, 11.0", }, ], }, ], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-27T11:20:45", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-0425", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", version: { version_data: [ { version_value: "Android 10.0, 11.0", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/September-2021", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2021-0425", datePublished: "2021-09-27T11:20:45", dateReserved: "2020-11-06T00:00:00", dateUpdated: "2024-08-03T15:40:01.056Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20053
Vulnerability from cvelistv5
Published
2022-03-09 17:02
Modified
2024-08-03 01:55
Severity ?
EPSS score ?
Summary
In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/March-2022 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T01:55:46.334Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/March-2022", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797", vendor: "MediaTek, Inc.", versions: [ { status: "affected", version: "Android 9.0, 10.0, 11.0, 12.0", }, ], }, ], descriptions: [ { lang: "en", value: "In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-09T17:02:17", orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", shortName: "MediaTek", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/March-2022", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mediatek.com", ID: "CVE-2022-20053", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797", version: { version_data: [ { version_value: "Android 9.0, 10.0, 11.0, 12.0", }, ], }, }, ], }, vendor_name: "MediaTek, Inc.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/March-2022", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/March-2022", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", assignerShortName: "MediaTek", cveId: "CVE-2022-20053", datePublished: "2022-03-09T17:02:17", dateReserved: "2021-10-12T00:00:00", dateUpdated: "2024-08-03T01:55:46.334Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20084
Vulnerability from cvelistv5
Published
2022-05-03 19:55
Modified
2024-08-03 02:02
Severity ?
EPSS score ?
Summary
In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/May-2022 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:02:30.518Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/May-2022", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797", vendor: "MediaTek, Inc.", versions: [ { status: "affected", version: "Android 10.0, 11.0, 12.0", }, ], }, ], descriptions: [ { lang: "en", value: "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-03T19:55:34", orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", shortName: "MediaTek", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/May-2022", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mediatek.com", ID: "CVE-2022-20084", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797", version: { version_data: [ { version_value: "Android 10.0, 11.0, 12.0", }, ], }, }, ], }, vendor_name: "MediaTek, Inc.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/May-2022", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/May-2022", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", assignerShortName: "MediaTek", cveId: "CVE-2022-20084", datePublished: "2022-05-03T19:55:34", dateReserved: "2021-10-12T00:00:00", dateUpdated: "2024-08-03T02:02:30.518Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-0424
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
EPSS score ?
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/September-2021 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:40:01.167Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", vendor: "n/a", versions: [ { status: "affected", version: "Android 10.0, 11.0", }, ], }, ], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-27T11:20:39", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-0424", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", version: { version_data: [ { version_value: "Android 10.0, 11.0", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/September-2021", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2021-0424", datePublished: "2021-09-27T11:20:39", dateReserved: "2020-11-06T00:00:00", dateUpdated: "2024-08-03T15:40:01.167Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20093
Vulnerability from cvelistv5
Published
2022-05-03 19:59
Modified
2024-08-03 02:02
Severity ?
EPSS score ?
Summary
In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/May-2022 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:02:30.621Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/May-2022", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797", vendor: "MediaTek, Inc.", versions: [ { status: "affected", version: "Android 10.0, 11.0, 12.0", }, ], }, ], descriptions: [ { lang: "en", value: "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-03T19:59:02", orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", shortName: "MediaTek", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/May-2022", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mediatek.com", ID: "CVE-2022-20093", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797", version: { version_data: [ { version_value: "Android 10.0, 11.0, 12.0", }, ], }, }, ], }, vendor_name: "MediaTek, Inc.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/May-2022", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/May-2022", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", assignerShortName: "MediaTek", cveId: "CVE-2022-20093", datePublished: "2022-05-03T19:59:02", dateReserved: "2021-10-12T00:00:00", dateUpdated: "2024-08-03T02:02:30.621Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-0611
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:47
Severity ?
EPSS score ?
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/September-2021 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:47:28.038Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", vendor: "n/a", versions: [ { status: "affected", version: "Android 10.0, 11.0", }, ], }, ], descriptions: [ { lang: "en", value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-27T11:20:56", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-0611", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", version: { version_data: [ { version_value: "Android 10.0, 11.0", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/September-2021", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2021-0611", datePublished: "2021-09-27T11:20:56", dateReserved: "2020-11-06T00:00:00", dateUpdated: "2024-08-03T15:47:28.038Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-0421
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
EPSS score ?
Summary
In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/September-2021 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:40:01.266Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", vendor: "n/a", versions: [ { status: "affected", version: "Android 10.0, 11.0", }, ], }, ], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-27T11:20:21", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-0421", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", version: { version_data: [ { version_value: "Android 10.0, 11.0", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/September-2021", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2021-0421", datePublished: "2021-09-27T11:20:21", dateReserved: "2020-11-06T00:00:00", dateUpdated: "2024-08-03T15:40:01.266Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20051
Vulnerability from cvelistv5
Published
2022-03-09 17:02
Modified
2024-08-03 01:55
Severity ?
EPSS score ?
Summary
In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/March-2022 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T01:55:46.121Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/March-2022", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797", vendor: "MediaTek, Inc.", versions: [ { status: "affected", version: "Android 11.0, 12.0", }, ], }, ], descriptions: [ { lang: "en", value: "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-09T17:02:32", orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", shortName: "MediaTek", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/March-2022", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mediatek.com", ID: "CVE-2022-20051", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797", version: { version_data: [ { version_value: "Android 11.0, 12.0", }, ], }, }, ], }, vendor_name: "MediaTek, Inc.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/March-2022", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/March-2022", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", assignerShortName: "MediaTek", cveId: "CVE-2022-20051", datePublished: "2022-03-09T17:02:32", dateReserved: "2021-10-12T00:00:00", dateUpdated: "2024-08-03T01:55:46.121Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-0610
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:47
Severity ?
EPSS score ?
Summary
In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/September-2021 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:47:27.924Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", vendor: "n/a", versions: [ { status: "affected", version: "Android 10.0, 11.0", }, ], }, ], descriptions: [ { lang: "en", value: "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-27T11:20:50", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-0610", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893", version: { version_data: [ { version_value: "Android 10.0, 11.0", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/September-2021", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/September-2021", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2021-0610", datePublished: "2021-09-27T11:20:50", dateReserved: "2020-11-06T00:00:00", dateUpdated: "2024-08-03T15:47:27.924Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20068
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
EPSS score ?
Summary
In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/April-2022 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:02:29.756Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/April-2022", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6799, MT6833, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6985, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797", vendor: "MediaTek, Inc.", versions: [ { status: "affected", version: "Android 10.0, 11.0, 12.0", }, ], }, ], descriptions: [ { lang: "en", value: "In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-04-11T19:38:01", orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", shortName: "MediaTek", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/April-2022", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mediatek.com", ID: "CVE-2022-20068", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6799, MT6833, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6985, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797", version: { version_data: [ { version_value: "Android 10.0, 11.0, 12.0", }, ], }, }, ], }, vendor_name: "MediaTek, Inc.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/April-2022", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/April-2022", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", assignerShortName: "MediaTek", cveId: "CVE-2022-20068", datePublished: "2022-04-11T19:38:01", dateReserved: "2021-10-12T00:00:00", dateUpdated: "2024-08-03T02:02:29.756Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20070
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
EPSS score ?
Summary
In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.
References
▼ | URL | Tags |
---|---|---|
https://corp.mediatek.com/product-security-bulletin/April-2022 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:02:29.751Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/April-2022", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985", vendor: "MediaTek, Inc.", versions: [ { status: "affected", version: "Android 11.0, 12.0", }, ], }, ], descriptions: [ { lang: "en", value: "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-04-11T19:38:03", orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", shortName: "MediaTek", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/April-2022", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mediatek.com", ID: "CVE-2022-20070", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985", version: { version_data: [ { version_value: "Android 11.0, 12.0", }, ], }, }, ], }, vendor_name: "MediaTek, Inc.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/April-2022", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/April-2022", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", assignerShortName: "MediaTek", cveId: "CVE-2022-20070", datePublished: "2022-04-11T19:38:03", dateReserved: "2021-10-12T00:00:00", dateUpdated: "2024-08-03T02:02:29.751Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }