In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/August-2023 | Vendor Advisory |
https://corp.mediatek.com/product-security-bulletin/August-2023 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://corp.mediatek.com/product-security-bulletin/August-2023 - Vendor Advisory |
09 Aug 2023, 17:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
CPE | cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
References | (MISC) https://corp.mediatek.com/product-security-bulletin/August-2023 - Vendor Advisory |
07 Aug 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-07 04:15
Updated : 2024-11-21 07:41
NVD link : CVE-2023-20810
Mitre link : CVE-2023-20810
CVE.ORG link : CVE-2023-20810
JSON object : View
Products Affected
mediatek
- mt9615
- mt9636
- mt9012
- mt9020
- mt9221
- mt9222
- mt9022
- mt9631
- mt9610
- mt9649
- mt9011
- mt9216
- mt5695
- mt9630
- mt9266
- mt9653
- mt9032
- mt9613
- mt9667
- mt9675
- mt9669
- mt9666
- mt5691
- mt9288
- mt9220
- mt9639
- mt9218
- mt9256
- mt9652
- mt9618
- mt9617
- mt9650
- mt9671
- mt9688
- mt9632
- mt9638
- mt9286
- mt9629
- mt5583
- mt9021
- mt9602
- mt9030
- mt9031
- mt9016
- mt5221
- mt9611
- mt9612
- mt9255
- mt9685
- mt9269
- mt9010
- mt9686
- android
linux
- linux_kernel
CWE