Vulnerabilites related to mediatek - mt9030
Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03751198; Issue ID: DTV03751198.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| android | 10.0 | ||
| android | 11.0 | ||
| mediatek | mt5583 | - | |
| mediatek | mt5691 | - | |
| mediatek | mt5695 | - | |
| mediatek | mt9010 | - | |
| mediatek | mt9011 | - | |
| mediatek | mt9012 | - | |
| mediatek | mt9016 | - | |
| mediatek | mt9020 | - | |
| mediatek | mt9021 | - | |
| mediatek | mt9022 | - | |
| mediatek | mt9030 | - | |
| mediatek | mt9031 | - | |
| mediatek | mt9032 | - | |
| mediatek | mt9215 | - | |
| mediatek | mt9216 | - | |
| mediatek | mt9218 | - | |
| mediatek | mt9220 | - | |
| mediatek | mt9221 | - | |
| mediatek | mt9222 | - | |
| mediatek | mt9255 | - | |
| mediatek | mt9256 | - | |
| mediatek | mt9266 | - | |
| mediatek | mt9269 | - | |
| mediatek | mt9285 | - | |
| mediatek | mt9286 | - | |
| mediatek | mt9288 | - | |
| mediatek | mt9600 | - | |
| mediatek | mt9602 | - | |
| mediatek | mt9610 | - | |
| mediatek | mt9611 | - | |
| mediatek | mt9612 | - | |
| mediatek | mt9613 | - | |
| mediatek | mt9615 | - | |
| mediatek | mt9617 | - | |
| mediatek | mt9629 | - | |
| mediatek | mt9630 | - | |
| mediatek | mt9631 | - | |
| mediatek | mt9632 | - | |
| mediatek | mt9636 | - | |
| mediatek | mt9638 | - | |
| mediatek | mt9639 | - | |
| mediatek | mt9650 | - | |
| mediatek | mt9652 | - | |
| mediatek | mt9666 | - | |
| mediatek | mt9667 | - | |
| mediatek | mt9669 | - | |
| mediatek | mt9670 | - | |
| mediatek | mt9671 | - | |
| mediatek | mt9675 | - | |
| mediatek | mt9685 | - | |
| mediatek | mt9686 | - | |
| mediatek | mt9688 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C394724-3294-4953-85C8-EE3894B5092C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75A56009-090B-4101-B000-224412058654",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "350ED16A-35A5-4F54-A01F-6EADE58E5530",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70D16AAC-938F-4BE8-B7BB-067249A6C197",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D16B86F-32D2-4CA3-B18D-B19F63F14D5C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB388AFB-1185-4CF1-8023-C26E366F89DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "726E51E6-E765-4973-A0D2-5CC746CACFB9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B45803F-1AD2-47C8-BB9B-276628A0D605",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B028E80F-396F-4898-841D-9E99DE54FAC2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC84405-17EE-4C25-8477-317F2A6A095F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C42802-293E-448B-A059-DFDEF1D97EC2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6081A92B-4361-462A-9F7F-570AC7256CDB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49ED757E-42DD-4176-B216-915EFD8E2F40",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A9F24C9-2A69-44D9-A16B-E4187230F984",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E92602E3-1B1B-4683-801D-D151919C63EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AF44498-001B-4A51-AB32-EBC206B14741",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47E5EE7B-1208-4007-AF87-6DC309FFE312",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE404F4-FFAE-4646-9234-15230F0577F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA834B63-F689-48BA-84E6-500351990BFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1B3B37-22C4-42F4-8264-07512619D706",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B89606-5FD7-4513-984A-16217D37BF4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F4FC23-534B-449A-8344-1F13AE9C8C57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
"matchCriteriaId": "392C9A58-EAB1-44B5-B189-98C68CC23199",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D0EF507-52A0-45D1-AC26-97F765E691FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C826242C-440E-4D85-841E-570E9C69777C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD7AC916-FF8D-430D-837C-0587056198AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94F5F738-459C-4316-80AF-1B9C33E0F36B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
"matchCriteriaId": "046B7E06-8C40-4D37-8D10-4816E51CA143",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03751198; Issue ID: DTV03751198."
}
],
"id": "CVE-2023-20809",
"lastModified": "2024-11-21T07:41:34.370",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-08-07T04:15:14.240",
"references": [
{
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"sourceIdentifier": "security@mediatek.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Severity ?
Summary
In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "513F8951-3099-444A-9755-C3A75720EFD2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*",
"matchCriteriaId": "518D4593-D5E2-489C-92C3-343716A621E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C394724-3294-4953-85C8-EE3894B5092C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75A56009-090B-4101-B000-224412058654",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "350ED16A-35A5-4F54-A01F-6EADE58E5530",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70D16AAC-938F-4BE8-B7BB-067249A6C197",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D16B86F-32D2-4CA3-B18D-B19F63F14D5C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB388AFB-1185-4CF1-8023-C26E366F89DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B45803F-1AD2-47C8-BB9B-276628A0D605",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B028E80F-396F-4898-841D-9E99DE54FAC2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC84405-17EE-4C25-8477-317F2A6A095F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C42802-293E-448B-A059-DFDEF1D97EC2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6081A92B-4361-462A-9F7F-570AC7256CDB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49ED757E-42DD-4176-B216-915EFD8E2F40",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A9F24C9-2A69-44D9-A16B-E4187230F984",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E92602E3-1B1B-4683-801D-D151919C63EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AF44498-001B-4A51-AB32-EBC206B14741",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
"matchCriteriaId": "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47E5EE7B-1208-4007-AF87-6DC309FFE312",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE404F4-FFAE-4646-9234-15230F0577F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA834B63-F689-48BA-84E6-500351990BFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1B3B37-22C4-42F4-8264-07512619D706",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B89606-5FD7-4513-984A-16217D37BF4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F4FC23-534B-449A-8344-1F13AE9C8C57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
"matchCriteriaId": "392C9A58-EAB1-44B5-B189-98C68CC23199",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D0EF507-52A0-45D1-AC26-97F765E691FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C826242C-440E-4D85-841E-570E9C69777C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD7AC916-FF8D-430D-837C-0587056198AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94F5F738-459C-4316-80AF-1B9C33E0F36B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
"matchCriteriaId": "046B7E06-8C40-4D37-8D10-4816E51CA143",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061."
}
],
"id": "CVE-2023-20811",
"lastModified": "2024-11-21T07:41:34.753",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-07T04:15:14.367",
"references": [
{
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"sourceIdentifier": "security@mediatek.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Severity ?
Summary
In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "513F8951-3099-444A-9755-C3A75720EFD2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*",
"matchCriteriaId": "518D4593-D5E2-489C-92C3-343716A621E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C394724-3294-4953-85C8-EE3894B5092C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75A56009-090B-4101-B000-224412058654",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "350ED16A-35A5-4F54-A01F-6EADE58E5530",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70D16AAC-938F-4BE8-B7BB-067249A6C197",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D16B86F-32D2-4CA3-B18D-B19F63F14D5C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB388AFB-1185-4CF1-8023-C26E366F89DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B45803F-1AD2-47C8-BB9B-276628A0D605",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B028E80F-396F-4898-841D-9E99DE54FAC2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC84405-17EE-4C25-8477-317F2A6A095F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C42802-293E-448B-A059-DFDEF1D97EC2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6081A92B-4361-462A-9F7F-570AC7256CDB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49ED757E-42DD-4176-B216-915EFD8E2F40",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A9F24C9-2A69-44D9-A16B-E4187230F984",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E92602E3-1B1B-4683-801D-D151919C63EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AF44498-001B-4A51-AB32-EBC206B14741",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
"matchCriteriaId": "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47E5EE7B-1208-4007-AF87-6DC309FFE312",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE404F4-FFAE-4646-9234-15230F0577F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA834B63-F689-48BA-84E6-500351990BFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1B3B37-22C4-42F4-8264-07512619D706",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B89606-5FD7-4513-984A-16217D37BF4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F4FC23-534B-449A-8344-1F13AE9C8C57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
"matchCriteriaId": "392C9A58-EAB1-44B5-B189-98C68CC23199",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D0EF507-52A0-45D1-AC26-97F765E691FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C826242C-440E-4D85-841E-570E9C69777C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD7AC916-FF8D-430D-837C-0587056198AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94F5F738-459C-4316-80AF-1B9C33E0F36B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
"matchCriteriaId": "046B7E06-8C40-4D37-8D10-4816E51CA143",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061."
}
],
"id": "CVE-2023-20810",
"lastModified": "2024-11-21T07:41:34.623",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-07T04:15:14.307",
"references": [
{
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"sourceIdentifier": "security@mediatek.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-20811 (GCVE-0-2023-20811)
Vulnerability from cvelistv5
Published
2023-08-07 03:22
Modified
2024-12-04 15:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Elevation of Privilege
Summary
In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
References
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:14:41.212Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20811",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-04T15:11:33.415387Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T15:11:49.404Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MT5221, MT5583, MT5691, MT5695, MT9010, MT9011, MT9012, MT9016, MT9020, MT9021, MT9022, MT9030, MT9031, MT9032, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9286, MT9288, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9618, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9666, MT9667, MT9669, MT9671, MT9675, MT9685, MT9686, MT9688",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "Android 10.0, 11.0 / Linux 4.19"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-07T03:22:00.788Z",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2023-20811",
"datePublished": "2023-08-07T03:22:00.788Z",
"dateReserved": "2022-10-28T02:03:23.672Z",
"dateUpdated": "2024-12-04T15:11:49.404Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20809 (GCVE-0-2023-20809)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-22 19:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Elevation of Privilege
Summary
In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03751198; Issue ID: DTV03751198.
References
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:14:40.976Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt5583",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt5691",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt5695",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9010",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9011",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9012",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9016",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9020",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9021",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9022",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9030",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9031",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9032",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9215",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9216",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9218",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9220",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9221",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9222",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9255",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9256",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9266",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9269",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9285",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9286",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9288",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9600",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9602",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9610",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9611",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9612",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9613",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9615",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9617",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9629",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9630",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9631",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9632",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9636",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9638",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9639",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9650",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9652",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9666",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9667",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9669",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9670",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9671",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9675",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9685",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9686",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt9688",
"vendor": "mediatek",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "android",
"vendor": "google",
"versions": [
{
"status": "affected",
"version": "10.0"
},
{
"status": "affected",
"version": "11.0"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-20809",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-22T19:11:57.487601Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T19:12:32.096Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MT5583, MT5691, MT5695, MT9010, MT9011, MT9012, MT9016, MT9020, MT9021, MT9022, MT9030, MT9031, MT9032, MT9215, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9288, MT9600, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9666, MT9667, MT9669, MT9670, MT9671, MT9675, MT9685, MT9686, MT9688",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "Android 10.0, 11.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03751198; Issue ID: DTV03751198."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-07T03:21:56.862Z",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2023-20809",
"datePublished": "2023-08-07T03:21:56.862Z",
"dateReserved": "2022-10-28T02:03:23.672Z",
"dateUpdated": "2024-10-22T19:12:32.096Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20810 (GCVE-0-2023-20810)
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information Disclosure
Summary
In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
References
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:14:41.000Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20810",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-17T14:27:16.034002Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-17T14:27:33.720Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MT5221, MT5583, MT5691, MT5695, MT9010, MT9011, MT9012, MT9016, MT9020, MT9021, MT9022, MT9030, MT9031, MT9032, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9286, MT9288, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9618, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9666, MT9667, MT9669, MT9671, MT9675, MT9685, MT9686, MT9688",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "Android 10.0, 11.0 / Linux 4.19"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-07T03:21:58.826Z",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2023-20810",
"datePublished": "2023-08-07T03:21:58.826Z",
"dateReserved": "2022-10-28T02:03:23.672Z",
"dateUpdated": "2024-10-17T14:27:33.720Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}