CVE-2023-20738

In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645173.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:linuxfoundation:iot-yocto:22.2:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5836:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5838:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9000:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9023:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9687:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9902:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9932:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9952:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9972:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9982:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:41

Type Values Removed Values Added
References () https://corp.mediatek.com/product-security-bulletin/June-2023 - Vendor Advisory () https://corp.mediatek.com/product-security-bulletin/June-2023 - Vendor Advisory

09 Jun 2023, 03:54

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:iot-yocto:22.2:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5838:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9932:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9023:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9952:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9000:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5836:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9972:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9982:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9687:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9902:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
References (MISC) https://corp.mediatek.com/product-security-bulletin/June-2023 - (MISC) https://corp.mediatek.com/product-security-bulletin/June-2023 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7

06 Jun 2023, 13:36

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-06 13:15

Updated : 2024-11-21 07:41


NVD link : CVE-2023-20738

Mitre link : CVE-2023-20738

CVE.ORG link : CVE-2023-20738


JSON object : View

Products Affected

mediatek

  • mt6833
  • mt9952
  • mt9015
  • mt6889
  • mt9679
  • mt9023
  • mt8781
  • mt8175
  • mt6883
  • mt9972
  • mt9653
  • mt6893
  • mt8797
  • mt6853
  • mt5836
  • mt6785
  • mt9982
  • mt9902
  • mt9000
  • mt8791t
  • mt8365
  • mt8786
  • mt6769
  • mt5838
  • mt6768
  • mt6779
  • mt8673
  • mt6789
  • mt6873
  • mt9649
  • mt6781
  • mt5696
  • mt9932
  • mt6875
  • mt8395
  • mt9025
  • mt6891
  • mt9689
  • mt6885
  • mt8789
  • mt9687
  • mt6877
  • mt8195
  • mt6853t
  • mt8168
  • mt9618

google

  • android

linuxfoundation

  • yocto
  • iot-yocto
CWE
CWE-787

Out-of-bounds Write