Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-26475 (GCVE-0-2022-26475)
Vulnerability from cvelistv5
- Elevation of Privilege
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:03:32.890Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6853, MT6855, MT6873, MT6875, MT6879, MT6883, MT6885, MT6889, MT6895, MT6983, MT7663, MT7902, MT7921, MT8167S, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8512A, MT8518, MT8532, MT8667, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789", "vendor": "MediaTek, Inc.", "versions": [ { "status": "affected", "version": "Android 11.0, 12.0 and Yocto 3.1, 3.3" } ] } ], "descriptions": [ { "lang": "en", "value": "In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00", "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "shortName": "MediaTek" }, "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ] } }, "cveMetadata": { "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "assignerShortName": "MediaTek", "cveId": "CVE-2022-26475", "datePublished": "2022-10-07T00:00:00", "dateReserved": "2022-03-04T00:00:00", "dateUpdated": "2024-08-03T05:03:32.890Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-26475\",\"sourceIdentifier\":\"security@mediatek.com\",\"published\":\"2022-10-07T20:15:11.237\",\"lastModified\":\"2024-11-21T06:54:01.210\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743.\"},{\"lang\":\"es\",\"value\":\"En wlan, se presenta una posible escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS07310743; ID de incidencia: ALPS07310743\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2EECB3C-723A-492D-A6D7-6A1A73EDBFDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2385F2C9-3EA1-424B-AB8D-A672BF1CBE56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109DD7FD-3A48-4C3D-8E1A-4433B98E1E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8FB8EE9-FC56-4D5E-AE55-A5967634740C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F726F486-A86F-4215-AD93-7A07A071844A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C445EB80-6021-4E26-B74E-1B4B6910CE48\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CD97E1-8A76-48B4-9780-9698EF5A960F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D23991D5-1893-49F4-8A06-D5E66C96C3B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA369B8-8E23-492B-82CC-23114E6A5D1C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4EEE021-6B2A-47A0-AC6B-55525A40D718\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82E0A4F-072F-474C-B94C-8114ABE05639\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B9B0D82-82C1-4A77-A016-329B99C45F49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"366F1912-756B-443E-9962-224937DD7DFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704BE5CE-AE08-4432-A8B0-4C8BD62148AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15E2EC3F-9FB3-488B-B1C1-2793A416C755\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD64413C-C774-4C4F-9551-89E1AA9469EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B787DC3-8E5A-4968-B20B-37B6257FAAE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CA45C9-7BFE-4C93-B2AF-B86501F763AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10C79211-F064-499D-914E-0BACD038FBF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91DEA745-47A8-43F1-A1B2-F53F651A99EF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"639C5BDE-2E83-427A-BAB7-85EA9348AC68\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"582F1041-CD84-4763-AD6F-E08DD11F689F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23F65D7B-31A1-4D94-82E9-254A7A6D7BE1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62FDE8E0-FD9F-4D2B-944C-E17F34A09F06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97C76F98-5D8D-4E52-ABAF-CD27C1205B0E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"299378ED-41CE-4966-99B1-65D2BA1215EF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8512a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD3F702-DE9F-4481-8098-02A7B83F9868\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5E73E0-EF8D-4659-B447-66474BC05708\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE18D5C2-0423-4CE5-86E7-69E7BB131BBF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE14B46-C1CA-465F-8578-059FA2ED30EB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5126E05-25DC-4EF7-8DDE-BBA38A7547FB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26573298-76BC-49FE-8D99-CF03ED01B185\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE45F606-2E75-48BC-9D1B-99D504974CBF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE10C121-F2AD-43D2-8FF9-A6C197858220\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1505AD53-987E-4328-8E1D-F5F1EC12B677\"}]}]}],\"references\":[{\"url\":\"https://corp.mediatek.com/product-security-bulletin/October-2022\",\"source\":\"security@mediatek.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://corp.mediatek.com/product-security-bulletin/October-2022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
var-202210-0107
Vulnerability from variot
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743. Google of Android Products from other vendors have out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. MediaTek Inc. is the world's fourth-largest foundry semiconductor company. It is in a leading position in the markets of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available all over the world. This vulnerability is due to the lack of boundary checks in wlan, resulting in out-of-bounds writes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0107", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "12.0" }, { "model": "yocto", "scope": "eq", "trust": 1.0, "vendor": "linuxfoundation", "version": "3.3" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "11.0" }, { "model": "yocto", "scope": "eq", "trust": 1.0, "vendor": "linuxfoundation", "version": "3.1" }, { "model": "android", "scope": null, "trust": 0.8, "vendor": "google", "version": null }, { "model": "yocto", "scope": null, "trust": 0.8, "vendor": "linux", "version": null }, { "model": "mt6789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6853 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6855 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6873 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6875 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6883 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6885 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6889 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6983 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6769 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6769 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6781 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6781 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6785 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6785 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6855 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6879 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6879 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6983 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6853 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6873 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6883 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6885 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6889 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6895 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6895 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6761 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6761 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6765 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6765 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6779 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6779 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6875 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8183 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8183 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8365 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8365 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8385 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8385 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8786 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8786 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8788 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8788 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8167s android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8167s android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8175 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8175 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8185 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8185 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8362a android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8362a android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8667 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8667 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8766 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8766 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6761 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6761 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6762 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6762 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6762 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6762 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6765 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6765 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6768 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6768 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6769 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6769 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6779 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6779 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6781 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6781 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6785 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6785 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6789 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6789 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6853 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6853 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6855 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6855 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6873 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6873 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6875 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6875 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6879 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6879 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6883 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6883 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6885 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6885 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6889 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6889 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6895 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6895 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6983 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6983 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt7663 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt7663 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt7663 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt7663 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt7902 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt7902 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt7902 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt7902 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt7921 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt7921 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt7921 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt7921 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8167s yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8167s yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8175 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8175 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8183 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8183 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8185 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8185 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8362a yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8362a yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8365 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8365 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8385 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8385 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8512a android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8512a android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8512a yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8512a yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8518 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8518 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8518 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8518 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8532 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8532 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8532 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8532 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8667 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8667 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8695 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8695 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8695 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8695 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8696 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8696 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8696 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8696 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8766 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8766 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8768 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8768 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8786 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8786 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8788 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8788 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8789 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8789 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87963" }, { "db": "JVNDB", "id": "JVNDB-2022-018677" }, { "db": "NVD", "id": "CVE-2022-26475" } ] }, "cve": "CVE-2022-26475", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.1, "id": "CNVD-2022-87963", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2022-26475", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-26475", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-26475", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-26475", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-87963", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202210-346", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87963" }, { "db": "JVNDB", "id": "JVNDB-2022-018677" }, { "db": "CNNVD", "id": "CNNVD-202210-346" }, { "db": "NVD", "id": "CVE-2022-26475" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743. Google of Android Products from other vendors have out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. MediaTek Inc. is the world\u0027s fourth-largest foundry semiconductor company. It is in a leading position in the markets of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available all over the world. This vulnerability is due to the lack of boundary checks in wlan, resulting in out-of-bounds writes", "sources": [ { "db": "NVD", "id": "CVE-2022-26475" }, { "db": "JVNDB", "id": "JVNDB-2022-018677" }, { "db": "CNVD", "id": "CNVD-2022-87963" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26475", "trust": 3.8 }, { "db": "JVNDB", "id": "JVNDB-2022-018677", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-87963", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202210-346", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87963" }, { "db": "JVNDB", "id": "JVNDB-2022-018677" }, { "db": "CNNVD", "id": "CNNVD-202210-346" }, { "db": "NVD", "id": "CVE-2022-26475" } ] }, "id": "VAR-202210-0107", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-87963" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87963" } ] }, "last_update_date": "2024-08-14T14:43:41.801000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Multiple MediaTek chips wlan local privilege escalation vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/372271" }, { "title": "MediaTek Repair measures for chip input verification errors", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210333" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87963" }, { "db": "CNNVD", "id": "CNNVD-202210-346" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018677" }, { "db": "NVD", "id": "CVE-2022-26475" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://corp.mediatek.com/product-security-bulletin/october-2022" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26475" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26475/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87963" }, { "db": "JVNDB", "id": "JVNDB-2022-018677" }, { "db": "CNNVD", "id": "CNNVD-202210-346" }, { "db": "NVD", "id": "CVE-2022-26475" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-87963" }, { "db": "JVNDB", "id": "JVNDB-2022-018677" }, { "db": "CNNVD", "id": "CNNVD-202210-346" }, { "db": "NVD", "id": "CVE-2022-26475" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-87963" }, { "date": "2023-10-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018677" }, { "date": "2022-10-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-346" }, { "date": "2022-10-07T20:15:11.237000", "db": "NVD", "id": "CVE-2022-26475" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-87963" }, { "date": "2023-10-20T08:27:00", "db": "JVNDB", "id": "JVNDB-2022-018677" }, { "date": "2022-10-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-346" }, { "date": "2023-12-22T20:54:25.650000", "db": "NVD", "id": "CVE-2022-26475" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-346" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Google\u00a0 of \u00a0Android\u00a0 Out-of-Bounds Write Vulnerability in Other Vendors\u0027 Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018677" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-346" } ], "trust": 0.6 } }
ghsa-f396-7w6f-w8qq
Vulnerability from github
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743.
{ "affected": [], "aliases": [ "CVE-2022-26475" ], "database_specific": { "cwe_ids": [ "CWE-20", "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-10-07T20:15:00Z", "severity": "MODERATE" }, "details": "In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743.", "id": "GHSA-f396-7w6f-w8qq", "modified": "2022-10-11T19:00:29Z", "published": "2022-10-08T00:00:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26475" }, { "type": "WEB", "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2022-26475
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
linuxfoundation | yocto | 3.1 | |
linuxfoundation | yocto | 3.3 | |
android | 11.0 | ||
android | 12.0 | ||
mediatek | mt6761 | - | |
mediatek | mt6762 | - | |
mediatek | mt6765 | - | |
mediatek | mt6768 | - | |
mediatek | mt6769 | - | |
mediatek | mt6779 | - | |
mediatek | mt6781 | - | |
mediatek | mt6785 | - | |
mediatek | mt6789 | - | |
mediatek | mt6853 | - | |
mediatek | mt6855 | - | |
mediatek | mt6873 | - | |
mediatek | mt6875 | - | |
mediatek | mt6879 | - | |
mediatek | mt6883 | - | |
mediatek | mt6885 | - | |
mediatek | mt6889 | - | |
mediatek | mt6895 | - | |
mediatek | mt6983 | - | |
mediatek | mt7663 | - | |
mediatek | mt7902 | - | |
mediatek | mt7921 | - | |
mediatek | mt8167s | - | |
mediatek | mt8175 | - | |
mediatek | mt8183 | - | |
mediatek | mt8185 | - | |
mediatek | mt8362a | - | |
mediatek | mt8365 | - | |
mediatek | mt8385 | - | |
mediatek | mt8512a | - | |
mediatek | mt8518 | - | |
mediatek | mt8532 | - | |
mediatek | mt8667 | - | |
mediatek | mt8695 | - | |
mediatek | mt8696 | - | |
mediatek | mt8766 | - | |
mediatek | mt8768 | - | |
mediatek | mt8786 | - | |
mediatek | mt8788 | - | |
mediatek | mt8789 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2EECB3C-723A-492D-A6D7-6A1A73EDBFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C79211-F064-499D-914E-0BACD038FBF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*", "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*", "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8512a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABD3F702-DE9F-4481-8098-02A7B83F9868", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE5E73E0-EF8D-4659-B447-66474BC05708", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*", "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743." }, { "lang": "es", "value": "En wlan, se presenta una posible escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS07310743; ID de incidencia: ALPS07310743" } ], "id": "CVE-2022-26475", "lastModified": "2024-11-21T06:54:01.210", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-07T20:15:11.237", "references": [ { "source": "security@mediatek.com", "tags": [ "Vendor Advisory" ], "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ], "sourceIdentifier": "security@mediatek.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2022-26475
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-26475", "id": "GSD-2022-26475" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-26475" ], "details": "In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743.", "id": "GSD-2022-26475", "modified": "2023-12-13T01:19:39.598625Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@mediatek.com", "ID": "CVE-2022-26475", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6853, MT6855, MT6873, MT6875, MT6879, MT6883, MT6885, MT6889, MT6895, MT6983, MT7663, MT7902, MT7921, MT8167S, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8512A, MT8518, MT8532, MT8667, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789", "version": { "version_data": [ { "version_value": "Android 11.0, 12.0 and Yocto 3.1, 3.3" } ] } } ] }, "vendor_name": "MediaTek, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://corp.mediatek.com/product-security-bulletin/October-2022", "refsource": "MISC", "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2EECB3C-723A-492D-A6D7-6A1A73EDBFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C79211-F064-499D-914E-0BACD038FBF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*", "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*", "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8512a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABD3F702-DE9F-4481-8098-02A7B83F9868", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE5E73E0-EF8D-4659-B447-66474BC05708", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*", "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "descriptions": [ { "lang": "en", "value": "In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743." }, { "lang": "es", "value": "En wlan, se presenta una posible escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS07310743; ID de incidencia: ALPS07310743" } ], "id": "CVE-2022-26475", "lastModified": "2023-12-22T20:54:25.650", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-07T20:15:11.237", "references": [ { "source": "security@mediatek.com", "tags": [ "Vendor Advisory" ], "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ], "sourceIdentifier": "security@mediatek.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
cnvd-2022-87963
Vulnerability from cnvd
Title: 多款MediaTek芯片wlan本地权限提升漏洞
Description:
联发科技股份有限公司(MediaTek Inc.)是全球第四大晶圆厂半导体公司,在移动终端、智能家居应用、无线连接技术及物联网产品等市场位居领先地位,一年约有15亿台内建MediaTek芯片的终端产品在全球各地上市。
多款MediaTek芯片存在本地权限提升漏洞,该漏洞源于在wlan中缺少边界检查,导致可越界写入,攻击者可利用该漏洞进行本地权限提升。
Severity: 中
Patch Name: 多款MediaTek芯片wlan本地权限提升漏洞的补丁
Patch Description:
联发科技股份有限公司(MediaTek Inc.)是全球第四大晶圆厂半导体公司,在移动终端、智能家居应用、无线连接技术及物联网产品等市场位居领先地位,一年约有15亿台内建MediaTek芯片的终端产品在全球各地上市。
多款MediaTek芯片存在本地权限提升漏洞,该漏洞源于在wlan中缺少边界检查,导致可越界写入,攻击者可利用该漏洞进行本地权限提升。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://corp.mediatek.com/product-security-bulletin/October-2022
Reference: https://corp.mediatek.com/product-security-bulletin/October-2022
Name | ['MediaTek MT6789 Android 11.0', 'MediaTek MT6853 Android 11.0', 'MediaTek MT6855 Android 11.0', 'MediaTek MT6873 Android 11.0', 'MediaTek MT6875 Android 11.0', 'MediaTek MT6883 Android 11.0', 'MediaTek MT6885 Android 11.0', 'MediaTek MT6889 Android 11.0', 'MediaTek MT6983 Android 11.0', 'MediaTek MT6769 Android 12.0', 'MediaTek MT6769 Android 11.0', 'MediaTek MT6781 Android 12.0', 'MediaTek MT6781 Android 11.0', 'MediaTek MT6785 Android 12.0', 'MediaTek MT6785 Android 11.0', 'MediaTek MT6855 Android 12.0', 'MediaTek MT6879 Android 12.0', 'MediaTek MT6879 Android 11.0', 'MediaTek MT6983 Android 12.0', 'MediaTek MT6853 Android 12.0', 'MediaTek MT6873 Android 12.0', 'MediaTek MT6883 Android 12.0', 'MediaTek MT6885 Android 12.0', 'MediaTek MT6889 Android 12.0', 'MediaTek MT6895 Android 12.0', 'MediaTek MT6895 Android 11.0', 'MediaTek MT6761 Android 12.0', 'MediaTek MT6761 Android 11.0', 'MediaTek MT6765 Android 12.0', 'MediaTek MT6765 Android 11.0', 'MediaTek MT6768 Android 12.0', 'MediaTek MT6768 Android 11.0', 'MediaTek MT6779 Android 12.0', 'MediaTek MT6779 Android 11.0', 'MediaTek MT6875 Android 12.0', 'MediaTek MT8183 Android 12.0', 'MediaTek MT8183 Android 11.0', 'MediaTek MT8365 Android 12.0', 'MediaTek MT8365 Android 11.0', 'MediaTek MT8385 Android 12.0', 'MediaTek MT8385 Android 11.0', 'MediaTek MT8768 Android 12.0', 'MediaTek MT8768 Android 11.0', 'MediaTek MT8786 Android 12.0', 'MediaTek MT8786 Android 11.0', 'MediaTek MT8788 Android 12.0', 'MediaTek MT8788 Android 11.0', 'MediaTek MT8167S Android 12.0', 'MediaTek MT8167S Android 11.0', 'MediaTek MT8175 Android 12.0', 'MediaTek MT8175 Android 11.0', 'MediaTek MT8185 Android 12.0', 'MediaTek MT8185 Android 11.0', 'MediaTek MT8362A Android 12.0', 'MediaTek MT8362A Android 11.0', 'MediaTek MT8667 Android 12.0', 'MediaTek MT8667 Android 11.0', 'MediaTek MT8766 Android 12.0', 'MediaTek MT8766 Android 11.0', 'MediaTek MT6761 Yocto 3.1', 'MediaTek MT6761 Yocto 3.3', 'MediaTek MT6762 Android 11.0', 'MediaTek MT6762 Android 12.0', 'MediaTek MT6762 Yocto 3.1', 'MediaTek MT6762 Yocto 3.3', 'MediaTek MT6765 Yocto 3.1', 'MediaTek MT6765 Yocto 3.3', 'MediaTek MT6768 Yocto 3.1', 'MediaTek MT6768 Yocto 3.3', 'MediaTek MT6769 Yocto 3.1', 'MediaTek MT6769 Yocto 3.3', 'MediaTek MT6779 Yocto 3.1', 'MediaTek MT6779 Yocto 3.3', 'MediaTek MT6781 Yocto 3.1', 'MediaTek MT6781 Yocto 3.3', 'MediaTek MT6785 Yocto 3.1', 'MediaTek MT6785 Yocto 3.3', 'MediaTek MT6789 Android 12.0', 'MediaTek MT6789 Yocto 3.1', 'MediaTek MT6789 Yocto 3.3', 'MediaTek MT6853 Yocto 3.1', 'MediaTek MT6853 Yocto 3.3', 'MediaTek MT6855 Yocto 3.1', 'MediaTek MT6855 Yocto 3.3', 'MediaTek MT6873 Yocto 3.1', 'MediaTek MT6873 Yocto 3.3', 'MediaTek MT6875 Yocto 3.1', 'MediaTek MT6875 Yocto 3.3', 'MediaTek MT6879 Yocto 3.1', 'MediaTek MT6879 Yocto 3.3', 'MediaTek MT6883 Yocto 3.1', 'MediaTek MT6883 Yocto 3.3', 'MediaTek MT6885 Yocto 3.1', 'MediaTek MT6885 Yocto 3.3', 'MediaTek MT6889 Yocto 3.1', 'MediaTek MT6889 Yocto 3.3', 'MediaTek MT6895 Yocto 3.1', 'MediaTek MT6895 Yocto 3.3', 'MediaTek MT6983 Yocto 3.1', 'MediaTek MT6983 Yocto 3.3', 'MediaTek MT7663 Android 11.0', 'MediaTek MT7663 Android 12.0', 'MediaTek MT7663 Yocto 3.1', 'MediaTek MT7663 Yocto 3.3', 'MediaTek MT7902 Android 11.0', 'MediaTek MT7902 Android 12.0', 'MediaTek MT7902 Yocto 3.1', 'MediaTek MT7902 Yocto 3.3', 'MediaTek MT7921 Android 11.0', 'MediaTek MT7921 Android 12.0', 'MediaTek MT7921 Yocto 3.1', 'MediaTek MT7921 Yocto 3.3', 'MediaTek MT8167S Yocto 3.1', 'MediaTek MT8167S Yocto 3.3', 'MediaTek MT8175 Yocto 3.1', 'MediaTek MT8175 Yocto 3.3', 'MediaTek MT8183 Yocto 3.1', 'MediaTek MT8183 Yocto 3.3', 'MediaTek MT8185 Yocto 3.1', 'MediaTek MT8185 Yocto 3.3', 'MediaTek MT8362A Yocto 3.1', 'MediaTek MT8362A Yocto 3.3', 'MediaTek MT8365 Yocto 3.1', 'MediaTek MT8365 Yocto 3.3', 'MediaTek MT8385 Yocto 3.1', 'MediaTek MT8385 Yocto 3.3', 'MediaTek MT8512A Android 11.0', 'MediaTek MT8512A Android 12.0', 'MediaTek MT8512A Yocto 3.1', 'MediaTek MT8512A Yocto 3.3', 'MediaTek MT8518 Android 11.0', 'MediaTek MT8518 Android 12.0', 'MediaTek MT8518 Yocto 3.1', 'MediaTek MT8518 Yocto 3.3', 'MediaTek MT8532 Android 11.0', 'MediaTek MT8532 Android 12.0', 'MediaTek MT8532 Yocto 3.1', 'MediaTek MT8532 Yocto 3.3', 'MediaTek MT8667 Yocto 3.1', 'MediaTek MT8667 Yocto 3.3', 'MediaTek MT8695 Android 11.0', 'MediaTek MT8695 Android 12.0', 'MediaTek MT8695 Yocto 3.1', 'MediaTek MT8695 Yocto 3.3', 'MediaTek MT8696 Android 11.0', 'MediaTek MT8696 Android 12.0', 'MediaTek MT8696 Yocto 3.1', 'MediaTek MT8696 Yocto 3.3', 'MediaTek MT8766 Yocto 3.1', 'MediaTek MT8766 Yocto 3.3', 'MediaTek MT8768 Yocto 3.1', 'MediaTek MT8768 Yocto 3.3', 'MediaTek MT8786 Yocto 3.1', 'MediaTek MT8786 Yocto 3.3', 'MediaTek MT8788 Yocto 3.1', 'MediaTek MT8788 Yocto 3.3', 'MediaTek MT8789 Android 11.0', 'MediaTek MT8789 Android 12.0', 'MediaTek MT8789 Yocto 3.1', 'MediaTek MT8789 Yocto 3.3'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2022-26475", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-26475" } }, "description": "\u8054\u53d1\u79d1\u6280\u80a1\u4efd\u6709\u9650\u516c\u53f8\uff08MediaTek Inc.\uff09\u662f\u5168\u7403\u7b2c\u56db\u5927\u6676\u5706\u5382\u534a\u5bfc\u4f53\u516c\u53f8\uff0c\u5728\u79fb\u52a8\u7ec8\u7aef\u3001\u667a\u80fd\u5bb6\u5c45\u5e94\u7528\u3001\u65e0\u7ebf\u8fde\u63a5\u6280\u672f\u53ca\u7269\u8054\u7f51\u4ea7\u54c1\u7b49\u5e02\u573a\u4f4d\u5c45\u9886\u5148\u5730\u4f4d\uff0c\u4e00\u5e74\u7ea6\u670915\u4ebf\u53f0\u5185\u5efaMediaTek\u82af\u7247\u7684\u7ec8\u7aef\u4ea7\u54c1\u5728\u5168\u7403\u5404\u5730\u4e0a\u5e02\u3002\n\n\u591a\u6b3eMediaTek\u82af\u7247\u5b58\u5728\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728wlan\u4e2d\u7f3a\u5c11\u8fb9\u754c\u68c0\u67e5\uff0c\u5bfc\u81f4\u53ef\u8d8a\u754c\u5199\u5165\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884c\u672c\u5730\u6743\u9650\u63d0\u5347\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://corp.mediatek.com/product-security-bulletin/October-2022", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2022-87963", "openTime": "2022-12-15", "patchDescription": "\u8054\u53d1\u79d1\u6280\u80a1\u4efd\u6709\u9650\u516c\u53f8\uff08MediaTek Inc.\uff09\u662f\u5168\u7403\u7b2c\u56db\u5927\u6676\u5706\u5382\u534a\u5bfc\u4f53\u516c\u53f8\uff0c\u5728\u79fb\u52a8\u7ec8\u7aef\u3001\u667a\u80fd\u5bb6\u5c45\u5e94\u7528\u3001\u65e0\u7ebf\u8fde\u63a5\u6280\u672f\u53ca\u7269\u8054\u7f51\u4ea7\u54c1\u7b49\u5e02\u573a\u4f4d\u5c45\u9886\u5148\u5730\u4f4d\uff0c\u4e00\u5e74\u7ea6\u670915\u4ebf\u53f0\u5185\u5efaMediaTek\u82af\u7247\u7684\u7ec8\u7aef\u4ea7\u54c1\u5728\u5168\u7403\u5404\u5730\u4e0a\u5e02\u3002\r\n\r\n\u591a\u6b3eMediaTek\u82af\u7247\u5b58\u5728\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728wlan\u4e2d\u7f3a\u5c11\u8fb9\u754c\u68c0\u67e5\uff0c\u5bfc\u81f4\u53ef\u8d8a\u754c\u5199\u5165\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884c\u672c\u5730\u6743\u9650\u63d0\u5347\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "\u591a\u6b3eMediaTek\u82af\u7247wlan\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "MediaTek MT6789 Android 11.0", "MediaTek MT6853 Android 11.0", "MediaTek MT6855 Android 11.0", "MediaTek MT6873 Android 11.0", "MediaTek MT6875 Android 11.0", "MediaTek MT6883 Android 11.0", "MediaTek MT6885 Android 11.0", "MediaTek MT6889 Android 11.0", "MediaTek MT6983 Android 11.0", "MediaTek MT6769 Android 12.0", "MediaTek MT6769 Android 11.0", "MediaTek MT6781 Android 12.0", "MediaTek MT6781 Android 11.0", "MediaTek MT6785 Android 12.0", "MediaTek MT6785 Android 11.0", "MediaTek MT6855 Android 12.0", "MediaTek MT6879 Android 12.0", "MediaTek MT6879 Android 11.0", "MediaTek MT6983 Android 12.0", "MediaTek MT6853 Android 12.0", "MediaTek MT6873 Android 12.0", "MediaTek MT6883 Android 12.0", "MediaTek MT6885 Android 12.0", "MediaTek MT6889 Android 12.0", "MediaTek MT6895 Android 12.0", "MediaTek MT6895 Android 11.0", "MediaTek MT6761 Android 12.0", "MediaTek MT6761 Android 11.0", "MediaTek MT6765 Android 12.0", "MediaTek MT6765 Android 11.0", "MediaTek MT6768 Android 12.0", "MediaTek MT6768 Android 11.0", "MediaTek MT6779 Android 12.0", "MediaTek MT6779 Android 11.0", "MediaTek MT6875 Android 12.0", "MediaTek MT8183 Android 12.0", "MediaTek MT8183 Android 11.0", "MediaTek MT8365 Android 12.0", "MediaTek MT8365 Android 11.0", "MediaTek MT8385 Android 12.0", "MediaTek MT8385 Android 11.0", "MediaTek MT8768 Android 12.0", "MediaTek MT8768 Android 11.0", "MediaTek MT8786 Android 12.0", "MediaTek MT8786 Android 11.0", "MediaTek MT8788 Android 12.0", "MediaTek MT8788 Android 11.0", "MediaTek MT8167S Android 12.0", "MediaTek MT8167S Android 11.0", "MediaTek MT8175 Android 12.0", "MediaTek MT8175 Android 11.0", "MediaTek MT8185 Android 12.0", "MediaTek MT8185 Android 11.0", "MediaTek MT8362A Android 12.0", "MediaTek MT8362A Android 11.0", "MediaTek MT8667 Android 12.0", "MediaTek MT8667 Android 11.0", "MediaTek MT8766 Android 12.0", "MediaTek MT8766 Android 11.0", "MediaTek MT6761 Yocto 3.1", "MediaTek MT6761 Yocto 3.3", "MediaTek MT6762 Android 11.0", "MediaTek MT6762 Android 12.0", "MediaTek MT6762 Yocto 3.1", "MediaTek MT6762 Yocto 3.3", "MediaTek MT6765 Yocto 3.1", "MediaTek MT6765 Yocto 3.3", "MediaTek MT6768 Yocto 3.1", "MediaTek MT6768 Yocto 3.3", "MediaTek MT6769 Yocto 3.1", "MediaTek MT6769 Yocto 3.3", "MediaTek MT6779 Yocto 3.1", "MediaTek MT6779 Yocto 3.3", "MediaTek MT6781 Yocto 3.1", "MediaTek MT6781 Yocto 3.3", "MediaTek MT6785 Yocto 3.1", "MediaTek MT6785 Yocto 3.3", "MediaTek MT6789 Android 12.0", "MediaTek MT6789 Yocto 3.1", "MediaTek MT6789 Yocto 3.3", "MediaTek MT6853 Yocto 3.1", "MediaTek MT6853 Yocto 3.3", "MediaTek MT6855 Yocto 3.1", "MediaTek MT6855 Yocto 3.3", "MediaTek MT6873 Yocto 3.1", "MediaTek MT6873 Yocto 3.3", "MediaTek MT6875 Yocto 3.1", "MediaTek MT6875 Yocto 3.3", "MediaTek MT6879 Yocto 3.1", "MediaTek MT6879 Yocto 3.3", "MediaTek MT6883 Yocto 3.1", "MediaTek MT6883 Yocto 3.3", "MediaTek MT6885 Yocto 3.1", "MediaTek MT6885 Yocto 3.3", "MediaTek MT6889 Yocto 3.1", "MediaTek MT6889 Yocto 3.3", "MediaTek MT6895 Yocto 3.1", "MediaTek MT6895 Yocto 3.3", "MediaTek MT6983 Yocto 3.1", "MediaTek MT6983 Yocto 3.3", "MediaTek MT7663 Android 11.0", "MediaTek MT7663 Android 12.0", "MediaTek MT7663 Yocto 3.1", "MediaTek MT7663 Yocto 3.3", "MediaTek MT7902 Android 11.0", "MediaTek MT7902 Android 12.0", "MediaTek MT7902 Yocto 3.1", "MediaTek MT7902 Yocto 3.3", "MediaTek MT7921 Android 11.0", "MediaTek MT7921 Android 12.0", "MediaTek MT7921 Yocto 3.1", "MediaTek MT7921 Yocto 3.3", "MediaTek MT8167S Yocto 3.1", "MediaTek MT8167S Yocto 3.3", "MediaTek MT8175 Yocto 3.1", "MediaTek MT8175 Yocto 3.3", "MediaTek MT8183 Yocto 3.1", "MediaTek MT8183 Yocto 3.3", "MediaTek MT8185 Yocto 3.1", "MediaTek MT8185 Yocto 3.3", "MediaTek MT8362A Yocto 3.1", "MediaTek MT8362A Yocto 3.3", "MediaTek MT8365 Yocto 3.1", "MediaTek MT8365 Yocto 3.3", "MediaTek MT8385 Yocto 3.1", "MediaTek MT8385 Yocto 3.3", "MediaTek MT8512A Android 11.0", "MediaTek MT8512A Android 12.0", "MediaTek MT8512A Yocto 3.1", "MediaTek MT8512A Yocto 3.3", "MediaTek MT8518 Android 11.0", "MediaTek MT8518 Android 12.0", "MediaTek MT8518 Yocto 3.1", "MediaTek MT8518 Yocto 3.3", "MediaTek MT8532 Android 11.0", "MediaTek MT8532 Android 12.0", "MediaTek MT8532 Yocto 3.1", "MediaTek MT8532 Yocto 3.3", "MediaTek MT8667 Yocto 3.1", "MediaTek MT8667 Yocto 3.3", "MediaTek MT8695 Android 11.0", "MediaTek MT8695 Android 12.0", "MediaTek MT8695 Yocto 3.1", "MediaTek MT8695 Yocto 3.3", "MediaTek MT8696 Android 11.0", "MediaTek MT8696 Android 12.0", "MediaTek MT8696 Yocto 3.1", "MediaTek MT8696 Yocto 3.3", "MediaTek MT8766 Yocto 3.1", "MediaTek MT8766 Yocto 3.3", "MediaTek MT8768 Yocto 3.1", "MediaTek MT8768 Yocto 3.3", "MediaTek MT8786 Yocto 3.1", "MediaTek MT8786 Yocto 3.3", "MediaTek MT8788 Yocto 3.1", "MediaTek MT8788 Yocto 3.3", "MediaTek MT8789 Android 11.0", "MediaTek MT8789 Android 12.0", "MediaTek MT8789 Yocto 3.1", "MediaTek MT8789 Yocto 3.3" ] }, "referenceLink": "https://corp.mediatek.com/product-security-bulletin/October-2022", "serverity": "\u4e2d", "submitTime": "2022-10-10", "title": "\u591a\u6b3eMediaTek\u82af\u7247wlan\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.