In modem EMM, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01183647; Issue ID: MOLY01183647 (MSV-963).
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://corp.mediatek.com/product-security-bulletin/April-2024 - |
01 Apr 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
05 Jan 2024, 12:13
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-20 | |
CPE | cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983w:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983z:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:* |
|
References | () https://corp.mediatek.com/product-security-bulletin/January-2024 - Vendor Advisory |
02 Jan 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-02 03:15
Updated : 2024-11-21 08:04
NVD link : CVE-2023-32890
Mitre link : CVE-2023-32890
CVE.ORG link : CVE-2023-32890
JSON object : View
Products Affected
mediatek
- mt6785
- mt6781
- mt6877t
- mt6878
- mt6893
- mt6980
- mt6879
- nr15
- mt6855
- mt6853
- mt6779
- mt6983t
- mt6983z
- mt6895
- mt2735
- mt6875
- mt6873
- mt6880
- mt6833p
- mt6889
- lr13
- mt6877
- mt6886
- mt6896
- mt6990
- mt6789
- mt6785t
- mt6833
- mt6853t
- mt6885
- mt6891
- nr17
- mt6813
- mt6895t
- mt6783
- nr16
- mt6983w
- mt6980d
- mt6985t
- mt6897
- mt6985
- mt6989
- mt6835
- mt6890
- mt6883
CWE
CWE-20
Improper Input Validation