Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2022-20083
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:02:30.449Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://corp.mediatek.com/product-security-bulletin/July-2022", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "MT2731, MT2735, MT6297, MT6725, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6755, MT6757, MT6757P, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6797, MT6799, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797", vendor: "MediaTek, Inc.", versions: [ { status: "affected", version: "Modem LR9, \nLR11, \nLR12, \nLR12A, \nLR13, \nNR15,\nNR16", }, ], }, ], descriptions: [ { lang: "en", value: "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.", }, ], problemTypes: [ { descriptions: [ { description: "Remote Code Execution", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-07-06T13:05:39", orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", shortName: "MediaTek", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://corp.mediatek.com/product-security-bulletin/July-2022", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mediatek.com", ID: "CVE-2022-20083", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT2731, MT2735, MT6297, MT6725, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6755, MT6757, MT6757P, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6797, MT6799, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797", version: { version_data: [ { version_value: "Modem LR9, \nLR11, \nLR12, \nLR12A, \nLR13, \nNR15,\nNR16", }, ], }, }, ], }, vendor_name: "MediaTek, Inc.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Remote Code Execution", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/July-2022", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/July-2022", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374", assignerShortName: "MediaTek", cveId: "CVE-2022-20083", datePublished: "2022-07-06T13:05:39", dateReserved: "2021-10-12T00:00:00", dateUpdated: "2024-08-03T02:02:30.449Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2022-20083\",\"sourceIdentifier\":\"security@mediatek.com\",\"published\":\"2022-07-06T14:15:16.980\",\"lastModified\":\"2024-11-21T06:42:07.020\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.\"},{\"lang\":\"es\",\"value\":\"En Modem 2G/3G CC, es posible sea producida una escritura fuera de límites debido a una falta de comprobación de límites. Esto podría conllevar a una ejecución de código remota cuando es descodificada FACILITY combinada sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del parche: MOLY00803883; ID de Incidencia: MOLY00803883\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFEBC79B-E936-4499-8B2D-C6619C51B755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EA5EB6-EBC1-4660-9E03-616CDB25C417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12318A0A-16CD-48A5-98A4-373070734642\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:lr9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387D7FC2-2146-4565-9B9B-D84EF686DBA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30A2D2E-6A72-4070-A471-EEE75F7D07F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B763B71-F913-45B4-B91E-D7F0670C4315\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6528FA05-C8B7-498B-93BE-0BEFED28C1FB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99B87E31-AC92-445B-94B8-33DBF72EC11C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6725:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCEE78CC-80F8-4C4F-92BA-378AAA85F087\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C82E144B-0BAD-47E1-A657-3A5880988FE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E76B29F-007E-4445-B3F3-3FDC054FEB84\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FA8A390-9F52-4CF3-9B45-936CE3E2B828\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F51C9D91-A64F-446E-BC14-7C79B770C3A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A1CB8F-3C1C-4374-8D46-23175D1174DE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47BE9434-12D6-4801-8B04-7F18AF58E717\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C27948-65A7-4B1E-9F10-6744D176A5C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6757p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"424A75C9-2A15-4B00-B0B7-703A4840CC1D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15C285A-0A26-46F7-9D72-CCADC47D93B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F726F486-A86F-4215-AD93-7A07A071844A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C445EB80-6021-4E26-B74E-1B4B6910CE48\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0002C537-4268-43CA-B349-BC14F1F0313C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F19C76A-50DF-4ACA-BACA-07157B4D838B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE80B083-D5A3-418C-9655-C79C9DECB4C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3367BA13-9C4D-4CCF-8E71-397F33CFF773\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CD97E1-8A76-48B4-9780-9698EF5A960F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D23991D5-1893-49F4-8A06-D5E66C96C3B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B43D63CF-FF77-41D8-BA4B-F8BDF88830BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA1BE913-70AE-49FE-99E9-E996165DF79D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE4D2AED-C713-407F-A34A-52C3D8F65835\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C387CFFD-BAE4-4626-8AC3-7C9CFB6819FB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA369B8-8E23-492B-82CC-23114E6A5D1C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4EEE021-6B2A-47A0-AC6B-55525A40D718\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C8F9C2-6471-4498-B089-2F40D2483487\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82E0A4F-072F-474C-B94C-8114ABE05639\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E208C7B7-7BF6-4E56-B61C-0198B08DC8B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B9B0D82-82C1-4A77-A016-329B99C45F49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE7CC141-E2D6-4F28-B6F0-167E11869CD1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9814939B-F05E-4870-90C0-7C0F6BAAEB39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"366F1912-756B-443E-9962-224937DD7DFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704BE5CE-AE08-4432-A8B0-4C8BD62148AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CF4A7A-3136-4C4C-A795-81323896BE11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15E2EC3F-9FB3-488B-B1C1-2793A416C755\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD64413C-C774-4C4F-9551-89E1AA9469EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B787DC3-8E5A-4968-B20B-37B6257FAAE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"171D1C08-F055-44C0-913C-AA2B73AF5B72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8E91CA4-CA5B-40D1-9A96-2B875104BCF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B5C7F-D965-4312-9CDF-4F06FA77D401\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CA45C9-7BFE-4C93-B2AF-B86501F763AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE14B46-C1CA-465F-8578-059FA2ED30EB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03E6123A-7603-4EAB-AFFB-229E8A040709\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45A7A805-EFED-47B3-884C-158FF1EECAEC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AACF35D-27E0-49AF-A667-13585C8B8071\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE45F606-2E75-48BC-9D1B-99D504974CBF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D09F23D-D023-4A60-B426-61251FDD8A5A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"533284E5-C3AF-48D3-A287-993099DB2E41\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE10C121-F2AD-43D2-8FF9-A6C197858220\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1505AD53-987E-4328-8E1D-F5F1EC12B677\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CD2C3EC-B62D-4616-964F-FDBE5B14A449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B469BF4-5961-42E9-814B-1BE06D182E45\"}]}]}],\"references\":[{\"url\":\"https://corp.mediatek.com/product-security-bulletin/July-2022\",\"source\":\"security@mediatek.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://corp.mediatek.com/product-security-bulletin/July-2022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", }, }
fkie_cve-2022-20083
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEBC79B-E936-4499-8B2D-C6619C51B755", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*", matchCriteriaId: "32EA5EB6-EBC1-4660-9E03-616CDB25C417", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*", matchCriteriaId: "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*", matchCriteriaId: "12318A0A-16CD-48A5-98A4-373070734642", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:lr9:-:*:*:*:*:*:*:*", matchCriteriaId: "387D7FC2-2146-4565-9B9B-D84EF686DBA5", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*", matchCriteriaId: "E30A2D2E-6A72-4070-A471-EEE75F7D07F2", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*", matchCriteriaId: "2B763B71-F913-45B4-B91E-D7F0670C4315", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*", matchCriteriaId: "6528FA05-C8B7-498B-93BE-0BEFED28C1FB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*", matchCriteriaId: "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*", matchCriteriaId: "99B87E31-AC92-445B-94B8-33DBF72EC11C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6725:-:*:*:*:*:*:*:*", matchCriteriaId: "BCEE78CC-80F8-4C4F-92BA-378AAA85F087", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", matchCriteriaId: "F51C9D91-A64F-446E-BC14-7C79B770C3A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", matchCriteriaId: "47BE9434-12D6-4801-8B04-7F18AF58E717", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6757p:-:*:*:*:*:*:*:*", matchCriteriaId: "424A75C9-2A15-4B00-B0B7-703A4840CC1D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", matchCriteriaId: "B15C285A-0A26-46F7-9D72-CCADC47D93B0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*", matchCriteriaId: "160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*", matchCriteriaId: "0002C537-4268-43CA-B349-BC14F1F0313C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*", matchCriteriaId: "AE80B083-D5A3-418C-9655-C79C9DECB4C5", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*", matchCriteriaId: "3367BA13-9C4D-4CCF-8E71-397F33CFF773", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*", matchCriteriaId: "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*", matchCriteriaId: "BA1BE913-70AE-49FE-99E9-E996165DF79D", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*", matchCriteriaId: "C387CFFD-BAE4-4626-8AC3-7C9CFB6819FB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*", matchCriteriaId: "F2C8F9C2-6471-4498-B089-2F40D2483487", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*", matchCriteriaId: "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", matchCriteriaId: "CE7CC141-E2D6-4F28-B6F0-167E11869CD1", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", matchCriteriaId: "68CF4A7A-3136-4C4C-A795-81323896BE11", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", matchCriteriaId: "171D1C08-F055-44C0-913C-AA2B73AF5B72", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", matchCriteriaId: "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", matchCriteriaId: "2FE14B46-C1CA-465F-8578-059FA2ED30EB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", matchCriteriaId: "03E6123A-7603-4EAB-AFFB-229E8A040709", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*", matchCriteriaId: "45A7A805-EFED-47B3-884C-158FF1EECAEC", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*", matchCriteriaId: "0D09F23D-D023-4A60-B426-61251FDD8A5A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.", }, { lang: "es", value: "En Modem 2G/3G CC, es posible sea producida una escritura fuera de límites debido a una falta de comprobación de límites. Esto podría conllevar a una ejecución de código remota cuando es descodificada FACILITY combinada sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del parche: MOLY00803883; ID de Incidencia: MOLY00803883", }, ], id: "CVE-2022-20083", lastModified: "2024-11-21T06:42:07.020", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-07-06T14:15:16.980", references: [ { source: "security@mediatek.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/July-2022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/July-2022", }, ], sourceIdentifier: "security@mediatek.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
var-202207-0316
Vulnerability from variot
In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883. MediaTek Inc. is the world's fourth-largest foundry semiconductor company. It is in a leading position in the market of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with about 1.5 billion units a year End products with built-in MediaTek chips are available all over the world. Attackers can use this vulnerability to execute remote code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0316", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "lr13", scope: "eq", trust: 1, vendor: "mediatek", version: null, }, { model: "nr16", scope: "eq", trust: 1, vendor: "mediatek", version: null, }, { model: "lr9", scope: "eq", trust: 1, vendor: "mediatek", version: null, }, { model: "nr15", scope: "eq", trust: 1, vendor: "mediatek", version: null, }, { model: "lr11", scope: "eq", trust: 1, vendor: "mediatek", version: null, }, { model: "lr12a", scope: "eq", trust: 1, vendor: "mediatek", version: null, }, { model: "lr12", scope: "eq", trust: 1, vendor: "mediatek", version: null, }, { model: "mt2731 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2731 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2731 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2731 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2731 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2731 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2731 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2735 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2735 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2735 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2735 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2735 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2735 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt2735 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6297 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6297 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6297 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6297 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6297 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6297 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6297 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6725 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6725 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6725 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6725 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6725 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6725 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6725 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6735 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6735 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6735 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6735 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6735 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6735 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6735 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6737 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6737 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6737 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6737 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6737 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6737 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6737 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6739 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6739 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6739 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6739 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6739 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6739 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6739 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750s lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750s lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750s lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750s lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750s lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750s nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6750s nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6755 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6755 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6755 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6755 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6755 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6755 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6755 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757p lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757p lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757p lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757p lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757p lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757p nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6757p nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6758 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6758 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6758 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6758 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6758 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6758 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6758 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6761 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6761 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6761 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6761 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6761 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6761 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6761 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762d lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762d lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762d lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762d lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762d lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762d nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762d nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762m lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762m lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762m lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762m lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762m lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762m nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6762m nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6763 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6763 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6763 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6763 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6763 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6763 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6763 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765t lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765t lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765t lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765t lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765t lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765t nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6765t nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6767 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6767 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6767 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6767 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6767 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6767 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6767 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6768 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6768 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6768 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6768 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6768 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6768 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6768 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769t lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769t lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769t lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769t lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769t lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769t nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769t nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769z lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769z lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769z lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769z lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769z lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769z nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6769z nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6771 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6771 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6771 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6771 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6771 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6771 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6771 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6775 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6775 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6775 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6775 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6775 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6775 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6775 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6779 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6779 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6779 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6779 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6779 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6779 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6779 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6781 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6781 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6781 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6781 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6781 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6781 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6781 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6783 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6783 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6783 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6783 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6783 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6783 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6783 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785t lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785t lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785t lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785t lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785t lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785t nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6785t nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6789 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6789 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6789 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6789 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6789 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6789 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6789 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6797 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6797 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6797 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6797 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6797 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6797 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6797 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6799 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6799 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6799 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6799 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6799 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6799 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6799 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6833 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6833 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6833 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6833 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6833 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6833 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6833 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6853 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6853 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6853 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6853 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6853 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6853 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6853 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6855 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6855 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6855 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6855 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6855 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6855 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6855 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6873 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6873 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6873 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6873 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6873 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6873 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6873 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6875 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6875 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6875 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6875 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6875 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6875 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6875 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6877 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6877 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6877 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6877 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6877 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6877 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6877 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6879 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6879 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6879 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6879 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6879 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6879 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6879 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6880 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6880 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6880 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6880 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6880 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6880 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6880 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6883 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6883 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6883 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6883 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6883 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6883 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6883 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6885 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6885 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6885 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6885 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6885 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6885 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6885 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6889 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6889 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6889 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6889 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6889 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6889 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6889 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6890 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6890 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6890 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6890 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6890 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6890 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6890 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6891 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6891 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6891 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6891 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6891 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6891 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6891 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6893 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6893 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6893 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6893 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6893 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6893 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6893 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6895 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6895 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6895 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6895 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6895 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6895 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6895 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6983 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6983 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6983 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6983 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6983 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6983 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt6983 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8666 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8666 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8666 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8666 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8666 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8666 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8666 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8667 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8667 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8667 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8667 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8667 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8667 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8667 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8675 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8675 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8675 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8675 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8675 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8675 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8675 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735a lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735a lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735a lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735a lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735a lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735a nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735a nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735b lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735b lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735b lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735b lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735b lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735b nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8735b nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8765 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8765 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8765 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8765 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8765 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8765 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8765 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8766 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8766 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8766 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8766 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8766 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8766 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8766 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8768 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8768 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8768 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8768 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8768 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8768 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8768 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8771 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8771 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8771 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8771 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8771 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8771 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8771 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8781 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8781 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8781 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8781 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8781 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8781 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8781 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8786 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8786 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8786 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8786 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8786 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8786 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8786 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8788 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8788 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8788 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8788 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8788 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8788 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8788 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8789 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8789 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8789 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8789 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8789 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8789 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8789 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8791 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8791 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8791 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8791 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8791 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8791 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8791 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8797 lr9", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8797 lr11", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8797 lr12", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8797 lr12a", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8797 lr13", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8797 nr15", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, { model: "mt8797 nr16", scope: null, trust: 0.6, vendor: "mediatek", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2022-85337", }, { db: "NVD", id: "CVE-2022-20083", }, ], }, cve: "CVE-2022-20083", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, id: "CVE-2022-20083", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 1.1, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, id: "CNVD-2022-85337", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2022-20083", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2022-20083", trust: 1, value: "CRITICAL", }, { author: "CNVD", id: "CNVD-2022-85337", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-202207-480", trust: 0.6, value: "CRITICAL", }, { author: "VULMON", id: "CVE-2022-20083", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2022-85337", }, { db: "VULMON", id: "CVE-2022-20083", }, { db: "CNNVD", id: "CNNVD-202207-480", }, { db: "NVD", id: "CVE-2022-20083", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883. MediaTek Inc. is the world's fourth-largest foundry semiconductor company. It is in a leading position in the market of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with about 1.5 billion units a year End products with built-in MediaTek chips are available all over the world. Attackers can use this vulnerability to execute remote code", sources: [ { db: "NVD", id: "CVE-2022-20083", }, { db: "CNVD", id: "CNVD-2022-85337", }, { db: "VULMON", id: "CVE-2022-20083", }, ], trust: 1.53, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-20083", trust: 2.3, }, { db: "CNVD", id: "CNVD-2022-85337", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.3342", trust: 0.6, }, { db: "CS-HELP", id: "SB2022070825", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202207-480", trust: 0.6, }, { db: "VULMON", id: "CVE-2022-20083", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2022-85337", }, { db: "VULMON", id: "CVE-2022-20083", }, { db: "CNNVD", id: "CNNVD-202207-480", }, { db: "NVD", id: "CVE-2022-20083", }, ], }, id: "VAR-202207-0316", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2022-85337", }, ], trust: 1.5898088022077919, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "IoT", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2022-85337", }, ], }, last_update_date: "2024-08-14T13:12:04.748000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Google Android Buffer error vulnerability fix", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=200007", }, ], sources: [ { db: "CNNVD", id: "CNNVD-202207-480", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-787", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2022-20083", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.3, url: "https://corp.mediatek.com/product-security-bulletin/july-2022", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-july-2022-38750", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-20083/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3342", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022070825", }, { trust: 0.6, url: "https://source.android.com/security/bulletin/2022-07-01", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/787.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "CNVD", id: "CNVD-2022-85337", }, { db: "VULMON", id: "CVE-2022-20083", }, { db: "CNNVD", id: "CNNVD-202207-480", }, { db: "NVD", id: "CVE-2022-20083", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2022-85337", }, { db: "VULMON", id: "CVE-2022-20083", }, { db: "CNNVD", id: "CNNVD-202207-480", }, { db: "NVD", id: "CVE-2022-20083", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-09-29T00:00:00", db: "CNVD", id: "CNVD-2022-85337", }, { date: "2022-07-06T00:00:00", db: "VULMON", id: "CVE-2022-20083", }, { date: "2022-07-06T00:00:00", db: "CNNVD", id: "CNNVD-202207-480", }, { date: "2022-07-06T14:15:16.980000", db: "NVD", id: "CVE-2022-20083", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-12-06T00:00:00", db: "CNVD", id: "CNVD-2022-85337", }, { date: "2022-07-14T00:00:00", db: "VULMON", id: "CVE-2022-20083", }, { date: "2022-07-15T00:00:00", db: "CNNVD", id: "CNNVD-202207-480", }, { date: "2022-07-14T01:28:52.117000", db: "NVD", id: "CVE-2022-20083", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202207-480", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Multiple MediaTek Chip Modem 2G/3G CC Out-of-Boundary Write Vulnerabilities", sources: [ { db: "CNVD", id: "CNVD-2022-85337", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-202207-480", }, ], trust: 0.6, }, }
gsd-2022-20083
Vulnerability from gsd
{ GSD: { alias: "CVE-2022-20083", description: "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.", id: "GSD-2022-20083", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2022-20083", ], details: "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.", id: "GSD-2022-20083", modified: "2023-12-13T01:19:16.692865Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@mediatek.com", ID: "CVE-2022-20083", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "MT2731, MT2735, MT6297, MT6725, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6755, MT6757, MT6757P, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6797, MT6799, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797", version: { version_data: [ { version_value: "Modem LR9, \nLR11, \nLR12, \nLR12A, \nLR13, \nNR15,\nNR16", }, ], }, }, ], }, vendor_name: "MediaTek, Inc.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Remote Code Execution", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/July-2022", refsource: "MISC", url: "https://corp.mediatek.com/product-security-bulletin/July-2022", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:mediatek:lr9:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6725:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6757p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@mediatek.com", ID: "CVE-2022-20083", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://corp.mediatek.com/product-security-bulletin/July-2022", refsource: "MISC", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/July-2022", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, }, }, lastModifiedDate: "2022-07-14T01:28Z", publishedDate: "2022-07-06T14:15Z", }, }, }
ghsa-w5h3-hfjg-f58j
Vulnerability from github
In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.
{ affected: [], aliases: [ "CVE-2022-20083", ], database_specific: { cwe_ids: [ "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2022-07-06T14:15:00Z", severity: "CRITICAL", }, details: "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.", id: "GHSA-w5h3-hfjg-f58j", modified: "2022-07-15T00:00:25Z", published: "2022-07-07T00:00:25Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-20083", }, { type: "WEB", url: "https://corp.mediatek.com/product-security-bulletin/July-2022", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.