Vulnerabilites related to mediatek - mt6732
Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.",
      },
      {
         lang: "es",
         value: "En memory management driver, se presenta una posible divulgación de información de canal lateral. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05400059",
      },
   ],
   id: "CVE-2021-0425",
   lastModified: "2024-11-21T05:42:42.010",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.737",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.",
      },
      {
         lang: "es",
         value: "En memory management driver, se presenta una posible divulgación de información debido a datos no inicializados. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05385714",
      },
   ],
   id: "CVE-2021-0423",
   lastModified: "2024-11-21T05:42:41.757",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.650",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-665",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.",
      },
      {
         lang: "es",
         value: "En telephony, es posible que sea deshabilitada la recepción de transmisiones de emergencia debido a una falta de comprobación de permisos. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06498874; ID de Incidencia: ALPS06498874",
      },
   ],
   id: "CVE-2022-20084",
   lastModified: "2024-11-21T06:42:07.160",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T20:15:08.197",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-06-06 18:15
Modified
2024-11-21 06:45
Summary
In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26573298-76BC-49FE-8D99-CF03ED01B185",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.",
      },
      {
         lang: "es",
         value: "En WLAN driver, se presenta una posible lectura fuera de límites debido a una comprobación de límites incorrecta. Esto podría conllevar a una divulgación de información local con los privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06545464; ID de incidencia: ALPS06545464",
      },
   ],
   id: "CVE-2022-21755",
   lastModified: "2024-11-21T06:45:22.530",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-06-06T18:15:08.973",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Summary
In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.",
      },
      {
         lang: "es",
         value: "En memory management driver, se presenta una posible corrupción de memoria debido a un desbordamiento de enteros. Esto podría conllevar una escalada local de privilegios sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID de parche: ALPS05403499; ID de Incidencia: ALPS05411456",
      },
   ],
   id: "CVE-2021-0610",
   lastModified: "2024-11-21T05:43:00.833",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.780",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.",
      },
      {
         lang: "es",
         value: "En ssmr, se presenta una posible escritura fuera de límites debido a una falta de comprobación de límites. Esto podría conllevar a una escalada local de privilegios con los privilegios de ejecución System requeridos. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06362920; ID de Incidencia: ALPS06362920",
      },
   ],
   id: "CVE-2022-20070",
   lastModified: "2024-11-21T06:42:04.710",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-04-11T20:15:19.033",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.",
      },
      {
         lang: "es",
         value: "En memory management driver, se presenta una posible divulgación de información debido a una falta de comprobación de límites. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05381235",
      },
   ],
   id: "CVE-2021-0421",
   lastModified: "2024-11-21T05:42:41.473",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.560",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-120",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.",
      },
      {
         lang: "es",
         value: "En memory management driver, es posible que se produzca un bloqueo del sistema debido a una falta de comprobación de límites. Esto podría conllevar a una denegación de servicio local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05393787",
      },
   ],
   id: "CVE-2021-0424",
   lastModified: "2024-11-21T05:42:41.887",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.693",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.",
      },
      {
         lang: "es",
         value: "En telephony, es posible que sea deshabilitada la recepción de mensajes SMS debido a una falta de comprobación de permisos. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06498868; ID de Incidencia: ALPS06498868",
      },
   ],
   id: "CVE-2022-20093",
   lastModified: "2024-11-21T06:42:08.273",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T20:15:08.530",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Summary
In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.",
      },
      {
         lang: "es",
         value: "En ims service, se presenta un posible comportamiento no esperado de la aplicación debido a una asignación de privilegios incorrecta. Esto podría conllevar a una denegación de servicio local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del parche: ALPS06219127; ID de Incidencia: ALPS06219127",
      },
   ],
   id: "CVE-2022-20051",
   lastModified: "2024-11-21T06:42:02.073",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-03-10T17:45:04.063",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-269",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-10-02 03:15
Modified
2024-11-21 07:41
Summary
In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.
Impacted products
Vendor Product Version
mediatek lr11 -
mediatek lr12a -
mediatek lr13 -
mediatek nr15 -
mediatek nr16 -
mediatek nr17 -
mediatek mt2731 -
mediatek mt6570 -
mediatek mt6580 -
mediatek mt6595 -
mediatek mt6732 -
mediatek mt6735 -
mediatek mt6737 -
mediatek mt6737m -
mediatek mt6738 -
mediatek mt6739 -
mediatek mt6750 -
mediatek mt6750s -
mediatek mt6752 -
mediatek mt6753 -
mediatek mt6755 -
mediatek mt6757 -
mediatek mt6758 -
mediatek mt6761 -
mediatek mt6762 -
mediatek mt6762d -
mediatek mt6762m -
mediatek mt6763 -
mediatek mt6765 -
mediatek mt6765t -
mediatek mt6767 -
mediatek mt6768 -
mediatek mt6769 -
mediatek mt6769t -
mediatek mt6769z -
mediatek mt6771 -
mediatek mt6775 -
mediatek mt6779 -
mediatek mt6781 -
mediatek mt6783 -
mediatek mt6785 -
mediatek mt6785t -
mediatek mt6789 -
mediatek mt6795 -
mediatek mt6797 -
mediatek mt6799 -
mediatek mt6813 -
mediatek mt6815 -
mediatek mt6833 -
mediatek mt6835 -
mediatek mt6853 -
mediatek mt6855 -
mediatek mt6873 -
mediatek mt6875 -
mediatek mt6875t -
mediatek mt6877 -
mediatek mt6878 -
mediatek mt6879 -
mediatek mt6883 -
mediatek mt6885 -
mediatek mt6886 -
mediatek mt6889 -
mediatek mt6891 -
mediatek mt6893 -
mediatek mt6895 -
mediatek mt6895t -
mediatek mt6896 -
mediatek mt6897 -
mediatek mt6983 -
mediatek mt6985 -
mediatek mt6989 -
mediatek mt8666 -
mediatek mt8666a -
mediatek mt8667 -
mediatek mt8673 -
mediatek mt8675 -
mediatek mt8765 -
mediatek mt8766 -
mediatek mt8766z -
mediatek mt8768 -
mediatek mt8768a -
mediatek mt8768b -
mediatek mt8768t -
mediatek mt8768z -
mediatek mt8781 -
mediatek mt8786 -
mediatek mt8788 -
mediatek mt8788t -
mediatek mt8788x -
mediatek mt8788z -
mediatek mt8791 -
mediatek mt8791t -
mediatek mt8797 -
mediatek mt8798 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFEBC79B-E936-4499-8B2D-C6619C51B755",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12318A0A-16CD-48A5-98A4-373070734642",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B763B71-F913-45B4-B91E-D7F0670C4315",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6528FA05-C8B7-498B-93BE-0BEFED28C1FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6570:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "975802CC-B130-4CF3-9B8E-A23DEA464259",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E3152A6-982E-415E-9F19-1CB2F6D11850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6738:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99735131-D437-40AA-9EDB-31DC61DD15DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0002C537-4268-43CA-B349-BC14F1F0313C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE80B083-D5A3-418C-9655-C79C9DECB4C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3367BA13-9C4D-4CCF-8E71-397F33CFF773",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA1BE913-70AE-49FE-99E9-E996165DF79D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C387CFFD-BAE4-4626-8AC3-7C9CFB6819FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2C8F9C2-6471-4498-B089-2F40D2483487",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7122918-8C44-4F24-82E4-B8448247FC83",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "855A8046-34ED-4891-ACE5-76AB10AC8D53",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DEF766-EAF1-4E36-BB7C-43069B26507A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A7D8055-F4B6-41EE-A078-11D56285AB66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF649E18-4DA8-4724-A9B2-575BC01BFACC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766z:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F25CBBB-B600-4A54-8653-4C60CD125353",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D039235C-D84C-4E9B-9D01-16A24E95FE79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D99E26E-A551-428C-90FF-0F6CDE28C1A1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21CA41B1-2BAF-43DE-AD79-396FA5125695",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768z:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02B6E7E0-8BD2-4BA1-948F-3F5A95B989F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0165F48B-B11A-4A8B-859B-083D239270FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4DE760A-BF65-4917-B571-1382C6703271",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788z:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CE75D73-582B-48BF-B38A-3F9626338C7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.",
      },
      {
         lang: "es",
         value: "En el CDMA PPP protocol, existe una posible escritura fuera de límites debido a una verificación de límites faltantes. Esto podría conducir a una escalada remota de privilegios sin necesidad de privilegios de ejecución adicionales. La interacción del usuario no es necesaria para la explotación. ID de parche: MOLY01068234; ID del problema: ALPS08010003.",
      },
   ],
   id: "CVE-2023-20819",
   lastModified: "2024-11-21T07:41:36.283",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-10-02T03:15:09.710",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45A7A805-EFED-47B3-884C-158FF1EECAEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.",
      },
      {
         lang: "es",
         value: "En mobile_log_d, se presenta un posible seguimiento de enlaces simbólicos debido a una resolución de enlaces inapropiada. Esto podría conllevar a una escalada local de privilegios con los privilegios de ejecución System requeridos. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS06308907; ID de Incidencia: ALPS06308907",
      },
   ],
   id: "CVE-2022-20068",
   lastModified: "2024-11-21T06:42:04.427",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-04-11T20:15:18.957",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-59",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Summary
In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.",
      },
      {
         lang: "es",
         value: "En ims service, se presenta una posible escalada de privilegios debido a una falta de comprobación de permisos. Esto podría conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del parche: ALPS06219097; ID de Incidencia: ALPS06219097",
      },
   ],
   id: "CVE-2022-20053",
   lastModified: "2024-11-21T06:42:02.353",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-03-10T17:45:04.477",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45A7A805-EFED-47B3-884C-158FF1EECAEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035",
      },
      {
         lang: "es",
         value: "En la aplicación Browser, existe una posible divulgación de información debido a la falta de comprobación de permisos. Esto podría conducir a la divulgación de información local sin necesidad de privilegios de ejecución adicionales. La interacción del usuario no es necesaria para la explotación.Producto: AndroidVersiones: Android SoCAndroid ID: A-199678035",
      },
   ],
   id: "CVE-2021-0672",
   lastModified: "2024-11-21T05:43:07.290",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-18T15:15:09.210",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://source.android.com/security/bulletin/2021-11-01",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://source.android.com/security/bulletin/2021-11-01",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.",
      },
      {
         lang: "es",
         value: "En m4u, se presenta una posible corrupción de memoria debido a un uso de memoria previamente liberada. Esto podría conllevar una escalada local de privilegios con los privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05425810",
      },
   ],
   id: "CVE-2021-0611",
   lastModified: "2024-11-21T05:43:00.947",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.823",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.",
      },
      {
         lang: "es",
         value: "En memory management driver, es posible que se produzca un bloqueo del sistema debido a una falta de comprobación de límites. Esto podría conllevar a una denegación de servicio local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05381071",
      },
   ],
   id: "CVE-2021-0422",
   lastModified: "2024-11-21T05:42:41.623",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.607",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:41
Summary
In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.",
      },
      {
         lang: "es",
         value: "En fb driver, se presenta una posible corrupción de memoria debido a un uso de memoria previamente liberada. Esto podría conllevar a una escalada local de privilegios remota sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05850708; ID de Incidencia: ALPS05850708",
      },
   ],
   id: "CVE-2022-20031",
   lastModified: "2024-11-21T06:41:59.210",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-02-09T23:15:17.157",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90566355-D426-49EE-A14C-6547CEF7527D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D82D95-8D21-41FF-BAA0-A31B531FA397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "869ACA37-7604-4002-A733-0A17076D2292",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "568CA081-CE41-4144-9B71-820FEB2596CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "324EAD89-E054-402A-9C61-1E4665F256A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A118804-9537-4270-8BCD-B3B71C61B14F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79808B44-9125-42D5-AC35-1A7B4F058ED4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42CCA9-A835-4871-A129-B83573713AA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C2668D-7A14-42AA-A164-957FE78B9ABF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "809FEAD7-F02B-48A9-B442-28B46C7806C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.",
      },
      {
         lang: "es",
         value: "En m4u, se presenta una posible corrupción de memoria debido a un uso de memoria previamente liberada. Esto podría conllevar a una escalada local de privilegios con los privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05425834",
      },
   ],
   id: "CVE-2021-0612",
   lastModified: "2024-11-21T05:43:01.063",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-27T12:15:07.867",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2021-0422
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:40:01.116Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:27",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0422",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0422",
      datePublished: "2021-09-27T11:20:27",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:40:01.116Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20031
Vulnerability from cvelistv5
Published
2022-02-09 22:05
Modified
2024-08-03 01:55
Severity ?
Summary
In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.099Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-09T22:05:36",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20031",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/February-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/February-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20031",
      datePublished: "2022-02-09T22:05:36",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.099Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20819
Vulnerability from cvelistv5
Published
2023-10-02 02:05
Modified
2024-09-21 15:27
Summary
In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.994Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt2731",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6570:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6570",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6580",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6595",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6732",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6735",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6737",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6737m:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6737m",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6738:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6738",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6739",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6750",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6750s",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6752",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6753",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6755",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6757",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6758",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6761",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6762",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6762d",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6762m",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6763",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6765",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6765t",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6767",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6768",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6769",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6769t",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6769z",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6771",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6775",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6779",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6781",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6783",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6785",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6785t",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6789",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6795",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6797",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6799",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6813",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6815",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6833",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6835",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6853",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6855",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6873",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6875",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6875t",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6877",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6878",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6879",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6883",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6885",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6886",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6889",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6891",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6893",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6895",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6895t",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6896",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6897",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6983",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6985",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt6989",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8666",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8666a",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8667",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8673",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8675",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8765",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8766",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8766z:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8766z",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8768",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8768a:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8768a",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8768b:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8768b",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8768t:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8768t",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8768z:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8768z",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8781",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8786",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8788",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8788t:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8788t",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8788x:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8788x",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8788z:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8788z",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8791",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8791t",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8797",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt8798",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20819",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-21T15:26:25.287276Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-21T15:27:05.080Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT2731, MT6570, MT6580, MT6595, MT6732, MT6735, MT6737, MT6737M, MT6738, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6757, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6795, MT6797, MT6799, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6983, MT6985, MT6989, MT8666, MT8666A, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766Z, MT8768, MT8768A, MT8768B, MT8768T, MT8768Z, MT8781, MT8786, MT8788, MT8788T, MT8788X, MT8788Z, MT8791, MT8791T, MT8797, MT8798",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Modem LR11, LR12A, LR13, NR15, NR16, NR17",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-10-02T02:05:25.077Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20819",
      datePublished: "2023-10-02T02:05:25.077Z",
      dateReserved: "2022-10-28T02:03:23.673Z",
      dateUpdated: "2024-09-21T15:27:05.080Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0612
Vulnerability from cvelistv5
Published
2021-09-27 11:21
Modified
2024-08-03 15:47
Severity ?
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:27.962Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:21:03",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0612",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0612",
      datePublished: "2021-09-27T11:21:03",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:27.962Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0672
Vulnerability from cvelistv5
Published
2021-11-18 14:54
Modified
2024-08-03 15:47
Severity ?
Summary
In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035
References
Impacted products
Vendor Product Version
n/a Android Version: Android SoC
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.235Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://source.android.com/security/bulletin/2021-11-01",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Android",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android SoC",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-15T18:05:34",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://source.android.com/security/bulletin/2021-11-01",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0672",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Android",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android SoC",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://source.android.com/security/bulletin/2021-11-01",
                     refsource: "MISC",
                     url: "https://source.android.com/security/bulletin/2021-11-01",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0672",
      datePublished: "2021-11-18T14:54:11",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.235Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0423
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:40:01.118Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:33",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0423",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0423",
      datePublished: "2021-09-27T11:20:33",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:40:01.118Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-21755
Vulnerability from cvelistv5
Published
2022-06-06 17:39
Modified
2024-08-03 02:53
Severity ?
Summary
In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:53:36.244Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8667, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-06-06T17:39:06",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-21755",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8667, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/June-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/June-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-21755",
      datePublished: "2022-06-06T17:39:06",
      dateReserved: "2021-11-26T00:00:00",
      dateUpdated: "2024-08-03T02:53:36.244Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0425
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:40:01.056Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:45",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0425",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0425",
      datePublished: "2021-09-27T11:20:45",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:40:01.056Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20053
Vulnerability from cvelistv5
Published
2022-03-09 17:02
Modified
2024-08-03 01:55
Severity ?
Summary
In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.334Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 9.0, 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-09T17:02:17",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20053",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 9.0, 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/March-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20053",
      datePublished: "2022-03-09T17:02:17",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.334Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20084
Vulnerability from cvelistv5
Published
2022-05-03 19:55
Modified
2024-08-03 02:02
Severity ?
Summary
In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.518Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T19:55:34",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20084",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20084",
      datePublished: "2022-05-03T19:55:34",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.518Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0424
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:40:01.167Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:39",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0424",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0424",
      datePublished: "2021-09-27T11:20:39",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:40:01.167Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20093
Vulnerability from cvelistv5
Published
2022-05-03 19:59
Modified
2024-08-03 02:02
Severity ?
Summary
In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.621Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T19:59:02",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20093",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20093",
      datePublished: "2022-05-03T19:59:02",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.621Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0611
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:47
Severity ?
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.038Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:56",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0611",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0611",
      datePublished: "2021-09-27T11:20:56",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.038Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0421
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:40:01.266Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:21",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0421",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0421",
      datePublished: "2021-09-27T11:20:21",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:40:01.266Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20051
Vulnerability from cvelistv5
Published
2022-03-09 17:02
Modified
2024-08-03 01:55
Severity ?
Summary
In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:55:46.121Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-09T17:02:32",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20051",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/March-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/March-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20051",
      datePublished: "2022-03-09T17:02:32",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T01:55:46.121Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0610
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:47
Severity ?
Summary
In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:27.924Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-27T11:20:50",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0610",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/September-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0610",
      datePublished: "2021-09-27T11:20:50",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:27.924Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20068
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:29.756Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6799, MT6833, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6985, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-11T19:38:01",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20068",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6799, MT6833, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6985, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/April-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20068",
      datePublished: "2022-04-11T19:38:01",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:29.756Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20070
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:29.751Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-11T19:38:03",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20070",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 11.0, 12.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/April-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/April-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20070",
      datePublished: "2022-04-11T19:38:03",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:29.751Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}