In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01128524 (MSV-846).
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/December-2023 | Vendor Advisory |
https://corp.mediatek.com/product-security-bulletin/December-2023 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://corp.mediatek.com/product-security-bulletin/December-2023 - Vendor Advisory |
07 Dec 2023, 17:34
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-617 | |
References | () https://corp.mediatek.com/product-security-bulletin/December-2023 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:* |
04 Dec 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-04 04:15
Updated : 2024-11-21 08:04
NVD link : CVE-2023-32841
Mitre link : CVE-2023-32841
CVE.ORG link : CVE-2023-32841
JSON object : View
Products Affected
mediatek
- mt6883
- mt6880
- mt6297
- mt6890
- mt6893
- mt6895t
- mt6855
- mt6879
- mt6873
- mt6891
- mt6896
- mt6885
- mt2737
- mt6990
- mt6835
- mt6875
- mt6886
- mt2735
- nr17
- nr15
- mt6897
- mt6989
- mt6980d
- mt6298
- mt6813
- mt6815
- mt6889
- mt6875t
- mt6983
- mt6853
- mt6833
- mt6877
- mt6985
- mt6980
- nr16
- mt6895
CWE
CWE-617
Reachable Assertion