Search criteria
6 vulnerabilities found for MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781 by MediaTek, Inc.
CVE-2023-20802 (GCVE-0-2023-20802)
Vulnerability from cvelistv5 – Published: 2023-08-07 03:21 – Updated: 2024-11-07 16:24
VLAI?
Summary
In imgsys, there is a possible memory corruption due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420976.
Severity ?
No CVSS data available.
CWE
- Elevation of Privilege
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MediaTek, Inc. | MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781 |
Affected:
Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:14:40.984Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6879",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6895",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6983",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8188",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8195",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8395",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8781",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20802",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T16:14:47.236338Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T16:24:43.393Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In imgsys, there is a possible memory corruption due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420976."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-07T03:21:42.242Z",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2023-20802",
"datePublished": "2023-08-07T03:21:42.242Z",
"dateReserved": "2022-10-28T02:03:23.671Z",
"dateUpdated": "2024-11-07T16:24:43.393Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20801 (GCVE-0-2023-20801)
Vulnerability from cvelistv5 – Published: 2023-08-07 03:21 – Updated: 2024-11-07 16:32
VLAI?
Summary
In imgsys, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420968.
Severity ?
No CVSS data available.
CWE
- Elevation of Privilege
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MediaTek, Inc. | MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781 |
Affected:
Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:14:41.146Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6879",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6895",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6983",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8188",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8195",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8395",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8781",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20801",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T16:25:33.232213Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T16:32:54.671Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In imgsys,\u00a0there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420968."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-07T03:21:40.073Z",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2023-20801",
"datePublished": "2023-08-07T03:21:40.073Z",
"dateReserved": "2022-10-28T02:03:10.781Z",
"dateUpdated": "2024-11-07T16:32:54.671Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20800 (GCVE-0-2023-20800)
Vulnerability from cvelistv5 – Published: 2023-08-07 03:21 – Updated: 2024-11-06 15:15
VLAI?
Summary
In imgsys, there is a possible system crash due to a mssing ptr check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420955.
Severity ?
No CVSS data available.
CWE
- Elevation of Privilege
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MediaTek, Inc. | MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781 |
Affected:
Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:14:41.016Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6879",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6895",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6983",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8188",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8195",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8395",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8781",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20800",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-06T15:09:06.403548Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-06T15:15:22.166Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In imgsys, there is a possible system crash due to a mssing ptr check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420955."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-07T03:21:37.830Z",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2023-20800",
"datePublished": "2023-08-07T03:21:37.830Z",
"dateReserved": "2022-10-28T02:03:10.781Z",
"dateUpdated": "2024-11-06T15:15:22.166Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20802 (GCVE-0-2023-20802)
Vulnerability from nvd – Published: 2023-08-07 03:21 – Updated: 2024-11-07 16:24
VLAI?
Summary
In imgsys, there is a possible memory corruption due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420976.
Severity ?
No CVSS data available.
CWE
- Elevation of Privilege
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MediaTek, Inc. | MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781 |
Affected:
Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:14:40.984Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6879",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6895",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6983",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8188",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8195",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8395",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8781",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/yocto_4.0\\/"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20802",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T16:14:47.236338Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T16:24:43.393Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In imgsys, there is a possible memory corruption due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420976."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-07T03:21:42.242Z",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2023-20802",
"datePublished": "2023-08-07T03:21:42.242Z",
"dateReserved": "2022-10-28T02:03:23.671Z",
"dateUpdated": "2024-11-07T16:24:43.393Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20801 (GCVE-0-2023-20801)
Vulnerability from nvd – Published: 2023-08-07 03:21 – Updated: 2024-11-07 16:32
VLAI?
Summary
In imgsys, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420968.
Severity ?
No CVSS data available.
CWE
- Elevation of Privilege
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MediaTek, Inc. | MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781 |
Affected:
Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:14:41.146Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6879",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6895",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6983",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8188",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8195",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8395",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8781",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12.0_13.0_IOT_v23.0\\/Yocto_4.0\\/"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20801",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T16:25:33.232213Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T16:32:54.671Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In imgsys,\u00a0there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420968."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-07T03:21:40.073Z",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2023-20801",
"datePublished": "2023-08-07T03:21:40.073Z",
"dateReserved": "2022-10-28T02:03:10.781Z",
"dateUpdated": "2024-11-07T16:32:54.671Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20800 (GCVE-0-2023-20800)
Vulnerability from nvd – Published: 2023-08-07 03:21 – Updated: 2024-11-06 15:15
VLAI?
Summary
In imgsys, there is a possible system crash due to a mssing ptr check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420955.
Severity ?
No CVSS data available.
CWE
- Elevation of Privilege
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MediaTek, Inc. | MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781 |
Affected:
Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:14:41.016Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6879",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6895",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6983",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8188",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8195",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8395",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
},
{
"cpes": [
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt8781",
"vendor": "mediatek",
"versions": [
{
"status": "affected",
"version": "android_12"
},
{
"status": "affected",
"version": "android_13_iot-v23.0_yocto-4.0"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20800",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-06T15:09:06.403548Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-06T15:15:22.166Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In imgsys, there is a possible system crash due to a mssing ptr check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420955."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-07T03:21:37.830Z",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/August-2023"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2023-20800",
"datePublished": "2023-08-07T03:21:37.830Z",
"dateReserved": "2022-10-28T02:03:10.781Z",
"dateUpdated": "2024-11-06T15:15:22.166Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}