In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796914; Issue ID: ALPS07796914.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/June-2023 | Vendor Advisory |
https://corp.mediatek.com/product-security-bulletin/June-2023 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 07:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://corp.mediatek.com/product-security-bulletin/June-2023 - Vendor Advisory |
09 Jun 2023, 03:55
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://corp.mediatek.com/product-security-bulletin/June-2023 - Vendor Advisory | |
CPE | cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5521:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:iot-yocto:22.2:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:* |
|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
06 Jun 2023, 13:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-06 13:15
Updated : 2025-01-07 19:15
NVD link : CVE-2023-20712
Mitre link : CVE-2023-20712
CVE.ORG link : CVE-2023-20712
JSON object : View
Products Affected
mediatek
- mt8766
- mt7668
- mt8791
- mt8673
- mt8781
- mt8789
- mt8788
- mt8362a
- mt6855
- mt6879
- mt8167s
- mt8797
- mt8695
- mt8786
- mt5521
- mt8768
- mt7663
- mt8168
- mt8532
- mt6789
- mt8518
- mt7921
- mt6983
- mt8175
- mt7902
- mt8365
- mt6895
- mt8385
linuxfoundation
- yocto
- iot-yocto
- android
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write