Show plain JSON{"id": "CVE-2023-32829", "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.7, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 0.8}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.7, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 0.8}]}, "published": "2023-10-02T03:15:10.183", "references": [{"url": "https://corp.mediatek.com/product-security-bulletin/October-2023", "tags": ["Vendor Advisory"], "source": "security@mediatek.com"}, {"url": "https://corp.mediatek.com/product-security-bulletin/October-2023", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-190"}]}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "description": [{"lang": "en", "value": "CWE-190"}]}], "descriptions": [{"lang": "en", "value": "In apusys, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07713478; Issue ID: ALPS07713478."}, {"lang": "es", "value": "En apusys, existe una posible escritura fuera de l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07713478; ID del problema: ALPS07713478."}], "lastModified": "2024-11-21T08:04:07.997", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2EECB3C-723A-492D-A6D7-6A1A73EDBFDF"}, {"criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56"}, {"criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951"}, {"criteria": "cpe:2.3:a:mediatek:iot_yocto:23.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C9ED712-53EF-4AF7-AB45-A87B50F6BE16"}, {"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"}, {"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"}, {"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"}, {"criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"}, {"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"}, {"criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A"}, {"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"}, {"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"}, {"criteria": "cpe:2.3:h:mediatek:mt8137:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E3E832CB-1FEB-4E32-B675-6CC49E4A8024"}, {"criteria": "cpe:2.3:h:mediatek:mt8139:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "14C5DB83-B705-4B2C-916E-4B67C0D9FBAB"}, {"criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"}, {"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"}, {"criteria": "cpe:2.3:h:mediatek:mt8195z:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9B3A37B9-F500-4B3C-B77C-B2BD7B015154"}, {"criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60"}, {"criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "security@mediatek.com"}