All the vulnerabilites related to mediatek - mt6755s
Vulnerability from fkie_nvd
Published
2021-12-15 19:15
Modified
2024-11-21 05:43
Summary
In alac decoder, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064258.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "975802CC-B130-4CF3-9B8E-A23DEA464259",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5B22E8-3536-4DBC-8E71-3E14FE45A887",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In alac decoder, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064258."
    },
    {
      "lang": "es",
      "value": "En el decodificador alac, existe una posible escritura fuera de l\u00edmites debido a una comprobaci\u00f3n de l\u00edmites incorrecta. Esto podr\u00eda llevar a una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID del parche: ALPS06064258; ID del problema: ALPS06064258"
    }
  ],
  "id": "CVE-2021-0675",
  "lastModified": "2024-11-21T05:43:07.663",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-12-15T19:15:10.573",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-06 18:15
Modified
2024-11-21 06:53
Severity ?
Summary
In BT firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784478; Issue ID: ALPS06784478.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:yoctoproject:yocto:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "987749DE-6EE9-401A-B2D4-B1680CAD0376",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5E73E0-EF8D-4659-B447-66474BC05708",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In BT firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784478; Issue ID: ALPS06784478."
    },
    {
      "lang": "es",
      "value": "En BT firmware, es posible que se produzca una escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo remota sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06784478; ID de Incidencia: ALPS06784478.\n"
    }
  ],
  "id": "CVE-2022-26447",
  "lastModified": "2024-11-21T06:53:58.003",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-06T18:15:11.610",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90566355-D426-49EE-A14C-6547CEF7527D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D82D95-8D21-41FF-BAA0-A31B531FA397",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869ACA37-7604-4002-A733-0A17076D2292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "568CA081-CE41-4144-9B71-820FEB2596CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "324EAD89-E054-402A-9C61-1E4665F256A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A118804-9537-4270-8BCD-B3B71C61B14F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79808B44-9125-42D5-AC35-1A7B4F058ED4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42CCA9-A835-4871-A129-B83573713AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834."
    },
    {
      "lang": "es",
      "value": "En m4u, se presenta una posible corrupci\u00f3n de memoria debido a un uso de memoria previamente liberada. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05425834"
    }
  ],
  "id": "CVE-2021-0612",
  "lastModified": "2024-11-21T05:43:01.063",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-27T12:15:07.867",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Summary
In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90566355-D426-49EE-A14C-6547CEF7527D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D82D95-8D21-41FF-BAA0-A31B531FA397",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869ACA37-7604-4002-A733-0A17076D2292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "568CA081-CE41-4144-9B71-820FEB2596CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "324EAD89-E054-402A-9C61-1E4665F256A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A118804-9537-4270-8BCD-B3B71C61B14F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79808B44-9125-42D5-AC35-1A7B4F058ED4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42CCA9-A835-4871-A129-B83573713AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456."
    },
    {
      "lang": "es",
      "value": "En memory management driver, se presenta una posible corrupci\u00f3n de memoria debido a un desbordamiento de enteros. Esto podr\u00eda conllevar una escalada local de privilegios sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: ALPS05403499; ID de Incidencia: ALPS05411456"
    }
  ],
  "id": "CVE-2021-0610",
  "lastModified": "2024-11-21T05:43:00.833",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-27T12:15:07.780",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:41
Summary
In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90566355-D426-49EE-A14C-6547CEF7527D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D82D95-8D21-41FF-BAA0-A31B531FA397",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869ACA37-7604-4002-A733-0A17076D2292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "568CA081-CE41-4144-9B71-820FEB2596CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "324EAD89-E054-402A-9C61-1E4665F256A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A118804-9537-4270-8BCD-B3B71C61B14F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79808B44-9125-42D5-AC35-1A7B4F058ED4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42CCA9-A835-4871-A129-B83573713AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708."
    },
    {
      "lang": "es",
      "value": "En fb driver, se presenta una posible corrupci\u00f3n de memoria debido a un uso de memoria previamente liberada. Esto podr\u00eda conllevar a una escalada local de privilegios remota sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05850708; ID de Incidencia: ALPS05850708"
    }
  ],
  "id": "CVE-2022-20031",
  "lastModified": "2024-11-21T06:41:59.210",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:17.157",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90566355-D426-49EE-A14C-6547CEF7527D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D82D95-8D21-41FF-BAA0-A31B531FA397",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869ACA37-7604-4002-A733-0A17076D2292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "568CA081-CE41-4144-9B71-820FEB2596CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "324EAD89-E054-402A-9C61-1E4665F256A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A118804-9537-4270-8BCD-B3B71C61B14F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79808B44-9125-42D5-AC35-1A7B4F058ED4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42CCA9-A835-4871-A129-B83573713AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059."
    },
    {
      "lang": "es",
      "value": "En memory management driver, se presenta una posible divulgaci\u00f3n de informaci\u00f3n de canal lateral. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05400059"
    }
  ],
  "id": "CVE-2021-0425",
  "lastModified": "2024-11-21T05:42:42.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-27T12:15:07.737",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:41
Summary
In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171689; Issue ID: ALPS06171689.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171689; Issue ID: ALPS06171689."
    },
    {
      "lang": "es",
      "value": "En ion driver, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a una comprobaci\u00f3n de l\u00edmites incorrecta. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local remota sin ser requeridos privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06171689; ID de Incidencia: ALPS06171689"
    }
  ],
  "id": "CVE-2022-20036",
  "lastModified": "2024-11-21T06:41:59.943",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:17.353",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Summary
In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097."
    },
    {
      "lang": "es",
      "value": "En ims service, se presenta una posible escalada de privilegios debido a una falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06219097; ID de Incidencia: ALPS06219097"
    }
  ],
  "id": "CVE-2022-20053",
  "lastModified": "2024-11-21T06:42:02.353",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-10T17:45:04.477",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874."
    },
    {
      "lang": "es",
      "value": "En telephony, es posible que sea deshabilitada la recepci\u00f3n de transmisiones de emergencia debido a una falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06498874; ID de Incidencia: ALPS06498874"
    }
  ],
  "id": "CVE-2022-20084",
  "lastModified": "2024-11-21T06:42:07.160",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T20:15:08.197",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988."
    },
    {
      "lang": "es",
      "value": "En flv extractor, se presenta una posible lectura fuera de l\u00edmites debido a un desbordamiento del b\u00fafer de la pila. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05594988; ID del Problema: ALPS05594988."
    }
  ],
  "id": "CVE-2021-0624",
  "lastModified": "2024-11-21T05:43:02.423",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-18T15:15:08.343",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-04 16:15
Modified
2024-11-21 06:41
Summary
In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:awus036nh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23A5CF60-C9DD-487C-8ABA-325D7A73694F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6630:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC85BBB-5985-41A1-B19F-1C580C367B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7662t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3331F3A6-E176-4EA5-B253-D5B03945C2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C79211-F064-499D-914E-0BACD038FBF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E400AB9-B82A-4449-8789-35112940270F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "739BE124-C307-41B2-8E92-C223FE67F88A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513."
    },
    {
      "lang": "es",
      "value": "En Bluetooth, se presenta un posible bloqueo de la aplicaci\u00f3n debido a que bluetooth no maneja apropiadamente la recepci\u00f3n de m\u00faltiples LMP_host_connection_req. Esto podr\u00eda conllevar a una denegaci\u00f3n de servicio remota de bluetooth sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06198513; ID de Incidencia: ALPS06198513"
    }
  ],
  "id": "CVE-2022-20021",
  "lastModified": "2024-11-21T06:41:57.907",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-04T16:15:10.600",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868."
    },
    {
      "lang": "es",
      "value": "En telephony, es posible que sea deshabilitada la recepci\u00f3n de mensajes SMS debido a una falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06498868; ID de Incidencia: ALPS06498868"
    }
  ],
  "id": "CVE-2022-20093",
  "lastModified": "2024-11-21T06:42:08.273",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T20:15:08.530",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C38B265-3EE8-417C-9D59-6182939ED27E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C04171-DB18-40D7-AFC5-04A869942396",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "455B256C-83C8-406F-B28F-A4205E7C094E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FF926A-2D26-4666-ACA4-474A89243566",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC84405-17EE-4C25-8477-317F2A6A095F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6081A92B-4361-462A-9F7F-570AC7256CDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47E5EE7B-1208-4007-AF87-6DC309FFE312",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA834B63-F689-48BA-84E6-500351990BFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF1B3B37-22C4-42F4-8264-07512619D706",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11B89606-5FD7-4513-984A-16217D37BF4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F4FC23-534B-449A-8344-1F13AE9C8C57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "392C9A58-EAB1-44B5-B189-98C68CC23199",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EF507-52A0-45D1-AC26-97F765E691FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C826242C-440E-4D85-841E-570E9C69777C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "046B7E06-8C40-4D37-8D10-4816E51CA143",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "961C13C3-2C3D-46B1-A618-D45920EC5E95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62282860-5EAF-45EA-B36E-6B6F124C3096",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381."
    },
    {
      "lang": "es",
      "value": "En asf extractor, se presenta una posible lectura fuera de l\u00edmites debido a un desbordamiento del b\u00fafer de la pila. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05489178; ID del Problema: ALPS05561381."
    }
  ],
  "id": "CVE-2021-0620",
  "lastModified": "2024-11-21T05:43:01.937",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-18T15:15:08.100",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-06-06 18:15
Modified
2024-11-21 06:45
Summary
In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058."
    },
    {
      "lang": "es",
      "value": "En telephony, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a una falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: ALPS06511058; ID de incidencia: ALPS06511058"
    }
  ],
  "id": "CVE-2022-21749",
  "lastModified": "2024-11-21T06:45:21.823",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-06-06T18:15:08.723",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90566355-D426-49EE-A14C-6547CEF7527D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D82D95-8D21-41FF-BAA0-A31B531FA397",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869ACA37-7604-4002-A733-0A17076D2292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "568CA081-CE41-4144-9B71-820FEB2596CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "324EAD89-E054-402A-9C61-1E4665F256A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A118804-9537-4270-8BCD-B3B71C61B14F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79808B44-9125-42D5-AC35-1A7B4F058ED4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42CCA9-A835-4871-A129-B83573713AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235."
    },
    {
      "lang": "es",
      "value": "En memory management driver, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05381235"
    }
  ],
  "id": "CVE-2021-0421",
  "lastModified": "2024-11-21T05:42:41.473",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-27T12:15:07.560",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-07-06 14:15
Modified
2024-11-21 06:45
Summary
In TEEI driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641388; Issue ID: ALPS06641388.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In TEEI driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641388; Issue ID: ALPS06641388."
    },
    {
      "lang": "es",
      "value": "En TEEI driver, Se presenta un posible uso despu\u00e9s de la liberaci\u00f3n debido a una condici\u00f3n de carrera. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06641388; ID de Incidencia: ALPS06641388"
    }
  ],
  "id": "CVE-2022-21773",
  "lastModified": "2024-11-21T06:45:24.597",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-06T14:15:17.593",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C38B265-3EE8-417C-9D59-6182939ED27E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C04171-DB18-40D7-AFC5-04A869942396",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "455B256C-83C8-406F-B28F-A4205E7C094E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FF926A-2D26-4666-ACA4-474A89243566",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8186:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4932D34-06F4-49D7-81FB-772A82E8A5B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC84405-17EE-4C25-8477-317F2A6A095F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6081A92B-4361-462A-9F7F-570AC7256CDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47E5EE7B-1208-4007-AF87-6DC309FFE312",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA834B63-F689-48BA-84E6-500351990BFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF1B3B37-22C4-42F4-8264-07512619D706",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11B89606-5FD7-4513-984A-16217D37BF4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F4FC23-534B-449A-8344-1F13AE9C8C57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "392C9A58-EAB1-44B5-B189-98C68CC23199",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EF507-52A0-45D1-AC26-97F765E691FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C826242C-440E-4D85-841E-570E9C69777C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "046B7E06-8C40-4D37-8D10-4816E51CA143",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "961C13C3-2C3D-46B1-A618-D45920EC5E95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62282860-5EAF-45EA-B36E-6B6F124C3096",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817."
    },
    {
      "lang": "es",
      "value": "En asf extractor, se presenta una posible lectura fuera de l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05489178; ID del Problema: ALPS05585817."
    }
  ],
  "id": "CVE-2021-0623",
  "lastModified": "2024-11-21T05:43:02.290",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-18T15:15:08.280",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90566355-D426-49EE-A14C-6547CEF7527D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D82D95-8D21-41FF-BAA0-A31B531FA397",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869ACA37-7604-4002-A733-0A17076D2292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "568CA081-CE41-4144-9B71-820FEB2596CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "324EAD89-E054-402A-9C61-1E4665F256A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A118804-9537-4270-8BCD-B3B71C61B14F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79808B44-9125-42D5-AC35-1A7B4F058ED4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42CCA9-A835-4871-A129-B83573713AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714."
    },
    {
      "lang": "es",
      "value": "En memory management driver, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a datos no inicializados. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05385714"
    }
  ],
  "id": "CVE-2021-0423",
  "lastModified": "2024-11-21T05:42:41.757",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-27T12:15:07.650",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-12-17 17:15
Modified
2024-11-21 05:43
Summary
In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "975802CC-B130-4CF3-9B8E-A23DEA464259",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5B22E8-3536-4DBC-8E71-3E14FE45A887",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237."
    },
    {
      "lang": "es",
      "value": "En el descodificador alac, se presenta una posible lectura fuera de l\u00edmites debido a una comprobaci\u00f3n de l\u00edmites incorrecta. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06064258; ID de Incidencia: ALPS06064237"
    }
  ],
  "id": "CVE-2021-0674",
  "lastModified": "2024-11-21T05:43:07.547",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-12-17T17:15:10.793",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-04 16:15
Modified
2024-11-21 06:41
Summary
In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6630:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC85BBB-5985-41A1-B19F-1C580C367B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7662t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3331F3A6-E176-4EA5-B253-D5B03945C2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C79211-F064-499D-914E-0BACD038FBF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E400AB9-B82A-4449-8789-35112940270F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "739BE124-C307-41B2-8E92-C223FE67F88A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578."
    },
    {
      "lang": "es",
      "value": "En Bluetooth, se presenta una posible desconexi\u00f3n del enlace debido a que bluetooth no maneja apropiadamente un intento de conexi\u00f3n desde un host con la misma direcci\u00f3n BD que el host BT actualmente conectado. Esto podr\u00eda conllevar a una denegaci\u00f3n de servicio remota de bluetooth sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06198578; ID de Incidencia: ALPS06198578"
    }
  ],
  "id": "CVE-2022-20022",
  "lastModified": "2024-11-21T06:41:58.040",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-04T16:15:10.653",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90566355-D426-49EE-A14C-6547CEF7527D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D82D95-8D21-41FF-BAA0-A31B531FA397",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869ACA37-7604-4002-A733-0A17076D2292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "568CA081-CE41-4144-9B71-820FEB2596CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "324EAD89-E054-402A-9C61-1E4665F256A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A118804-9537-4270-8BCD-B3B71C61B14F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79808B44-9125-42D5-AC35-1A7B4F058ED4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42CCA9-A835-4871-A129-B83573713AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071."
    },
    {
      "lang": "es",
      "value": "En memory management driver, es posible que se produzca un bloqueo del sistema debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una denegaci\u00f3n de servicio local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05381071"
    }
  ],
  "id": "CVE-2021-0422",
  "lastModified": "2024-11-21T05:42:41.623",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-27T12:15:07.607",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C38B265-3EE8-417C-9D59-6182939ED27E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C04171-DB18-40D7-AFC5-04A869942396",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "455B256C-83C8-406F-B28F-A4205E7C094E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FF926A-2D26-4666-ACA4-474A89243566",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8184:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEF76BE8-E35C-470B-813D-5290F6B0D281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC84405-17EE-4C25-8477-317F2A6A095F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6081A92B-4361-462A-9F7F-570AC7256CDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47E5EE7B-1208-4007-AF87-6DC309FFE312",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA834B63-F689-48BA-84E6-500351990BFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF1B3B37-22C4-42F4-8264-07512619D706",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11B89606-5FD7-4513-984A-16217D37BF4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F4FC23-534B-449A-8344-1F13AE9C8C57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "392C9A58-EAB1-44B5-B189-98C68CC23199",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EF507-52A0-45D1-AC26-97F765E691FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C826242C-440E-4D85-841E-570E9C69777C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "046B7E06-8C40-4D37-8D10-4816E51CA143",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "961C13C3-2C3D-46B1-A618-D45920EC5E95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62282860-5EAF-45EA-B36E-6B6F124C3096",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383."
    },
    {
      "lang": "es",
      "value": "En asf extractor, se presenta una posible lectura fuera de l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05489178; ID del Problema: ALPS05561383."
    }
  ],
  "id": "CVE-2021-0621",
  "lastModified": "2024-11-21T05:43:02.060",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-18T15:15:08.163",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In search engine service, there is a possible way to change the default search engine due to an incorrect comparison. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06219118; Issue ID: ALPS06219118.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In search engine service, there is a possible way to change the default search engine due to an incorrect comparison. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06219118; Issue ID: ALPS06219118."
    },
    {
      "lang": "es",
      "value": "En search engine service, se presenta la posibilidad de cambiar el motor de b\u00fasqueda predeterminado debido a una comparaci\u00f3n incorrecta. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06219118; ID de Incidencia: ALPS06219118"
    }
  ],
  "id": "CVE-2022-20072",
  "lastModified": "2024-11-21T06:42:04.970",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-11T20:15:19.110",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-697"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:42
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90566355-D426-49EE-A14C-6547CEF7527D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D82D95-8D21-41FF-BAA0-A31B531FA397",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869ACA37-7604-4002-A733-0A17076D2292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "568CA081-CE41-4144-9B71-820FEB2596CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "324EAD89-E054-402A-9C61-1E4665F256A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A118804-9537-4270-8BCD-B3B71C61B14F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79808B44-9125-42D5-AC35-1A7B4F058ED4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42CCA9-A835-4871-A129-B83573713AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787."
    },
    {
      "lang": "es",
      "value": "En memory management driver, es posible que se produzca un bloqueo del sistema debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una denegaci\u00f3n de servicio local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05393787"
    }
  ],
  "id": "CVE-2021-0424",
  "lastModified": "2024-11-21T05:42:41.887",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-27T12:15:07.693",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8127:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD7BDC63-3963-4C4D-B547-2936006926E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8135:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "182A995C-2453-4DF2-ABCC-A885D8C334C0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5B22E8-3536-4DBC-8E71-3E14FE45A887",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8312c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39915BEC-73D4-46B7-B52C-CED910AF3CA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8312d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF828C6-4B05-4E12-9B78-782F1F062F39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8382:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B7F410-9623-4878-AF8B-CB1E68B9C555",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8389:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61E84418-3D52-4C5B-919A-2C3EA3A20BC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8392:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2FE1D80-FBA8-452B-AAD1-A7BC430B44B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8392_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB784A7D-1B24-48FC-BC42-0F646BBD0B58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8665:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "367725BC-DE40-40F1-A59A-C4286CA9C0D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8685:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED17AD2-3B65-48EE-A56E-FEA4A5F38B8C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8693:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA2890F-59A8-4CAB-BDFA-883F8A38CE4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91F81E5-29D3-4BA7-9476-EBD644F7E4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3FC505E-CF02-4F29-8D17-0E0C05433B0D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2FD7E95-F0D4-492E-BB92-2597FB9D2884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "584F2DD7-F353-4156-BFAB-AE6DF5BB9251",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808."
    },
    {
      "lang": "es",
      "value": "En ged, se presenta una posible escritura fuera de l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05838808; ID de Incidencia: ALPS05838808"
    }
  ],
  "id": "CVE-2022-20075",
  "lastModified": "2024-11-21T06:42:05.940",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-11T20:15:19.227",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Summary
In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127."
    },
    {
      "lang": "es",
      "value": "En ims service, se presenta un posible comportamiento no esperado de la aplicaci\u00f3n debido a una asignaci\u00f3n de privilegios incorrecta. Esto podr\u00eda conllevar a una denegaci\u00f3n de servicio local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06219127; ID de Incidencia: ALPS06219127"
    }
  ],
  "id": "CVE-2022-20051",
  "lastModified": "2024-11-21T06:42:02.073",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-10T17:45:04.063",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In mdp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836585; Issue ID: ALPS05836585.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In mdp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836585; Issue ID: ALPS05836585."
    },
    {
      "lang": "es",
      "value": "En mdp, se presenta una posible escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es necesaria la interacci\u00f3n del usuario para la explotaci\u00f3n. ID del Parche: ALPS05836585; ID de Incidencia: ALPS05836585"
    }
  ],
  "id": "CVE-2022-20067",
  "lastModified": "2024-11-21T06:42:04.293",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-11T20:15:18.917",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-09-27 12:15
Modified
2024-11-21 05:43
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "097220D4-9195-42A9-AD2A-BC949BA7CFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE14F02-E96E-4342-8167-CBF4C1ADB8A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BB9139-5BAC-4DFE-8D48-3964BBFE3B4D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90566355-D426-49EE-A14C-6547CEF7527D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D82D95-8D21-41FF-BAA0-A31B531FA397",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869ACA37-7604-4002-A733-0A17076D2292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "568CA081-CE41-4144-9B71-820FEB2596CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B3AB3-F308-4EB6-851B-92B0C9CD4E32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "324EAD89-E054-402A-9C61-1E4665F256A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C732C6E0-37BA-43BA-AEBB-FE97538D3FF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A118804-9537-4270-8BCD-B3B71C61B14F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79808B44-9125-42D5-AC35-1A7B4F058ED4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42CCA9-A835-4871-A129-B83573713AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810."
    },
    {
      "lang": "es",
      "value": "En m4u, se presenta una posible corrupci\u00f3n de memoria debido a un uso de memoria previamente liberada. Esto podr\u00eda conllevar una escalada local de privilegios con los privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05403499; ID de Incidencia: ALPS05425810"
    }
  ],
  "id": "CVE-2021-0611",
  "lastModified": "2024-11-21T05:43:00.947",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-27T12:15:07.823",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035"
    },
    {
      "lang": "es",
      "value": "En la aplicaci\u00f3n Browser, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a la falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n.Producto: AndroidVersiones: Android SoCAndroid ID: A-199678035"
    }
  ],
  "id": "CVE-2021-0672",
  "lastModified": "2024-11-21T05:43:07.290",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-18T15:15:09.210",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://source.android.com/security/bulletin/2021-11-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://source.android.com/security/bulletin/2021-11-01"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:42
Summary
In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705."
    },
    {
      "lang": "es",
      "value": "En ion driver, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a una comprobaci\u00f3n de l\u00edmites incorrecta. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local remota sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06171705; ID de Incidencia: ALPS06171705"
    }
  ],
  "id": "CVE-2022-20037",
  "lastModified": "2024-11-21T06:42:00.093",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:17.393",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920."
    },
    {
      "lang": "es",
      "value": "En ssmr, se presenta una posible escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06362920; ID de Incidencia: ALPS06362920"
    }
  ],
  "id": "CVE-2022-20070",
  "lastModified": "2024-11-21T06:42:04.710",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-11T20:15:19.033",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-06-06 18:15
Modified
2024-11-21 06:45
Summary
In ccu, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06439600; Issue ID: ALPS06439600.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ccu, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06439600; Issue ID: ALPS06439600."
    },
    {
      "lang": "es",
      "value": "En ccu, se presenta una posible corrupci\u00f3n de memoria debido a una doble liberaci\u00f3n. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06439600; ID de Incidencia: ALPS06439600"
    }
  ],
  "id": "CVE-2022-21758",
  "lastModified": "2024-11-21T06:45:22.887",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-06-06T18:15:09.100",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-415"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8127:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD7BDC63-3963-4C4D-B547-2936006926E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8135:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "182A995C-2453-4DF2-ABCC-A885D8C334C0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5B22E8-3536-4DBC-8E71-3E14FE45A887",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8312c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39915BEC-73D4-46B7-B52C-CED910AF3CA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8312d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF828C6-4B05-4E12-9B78-782F1F062F39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8382:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B7F410-9623-4878-AF8B-CB1E68B9C555",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8389:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61E84418-3D52-4C5B-919A-2C3EA3A20BC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8392:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2FE1D80-FBA8-452B-AAD1-A7BC430B44B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8392_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB784A7D-1B24-48FC-BC42-0F646BBD0B58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8665:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "367725BC-DE40-40F1-A59A-C4286CA9C0D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8685:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED17AD2-3B65-48EE-A56E-FEA4A5F38B8C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8693:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA2890F-59A8-4CAB-BDFA-883F8A38CE4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91F81E5-29D3-4BA7-9476-EBD644F7E4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3FC505E-CF02-4F29-8D17-0E0C05433B0D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2FD7E95-F0D4-492E-BB92-2597FB9D2884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "584F2DD7-F353-4156-BFAB-AE6DF5BB9251",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556."
    },
    {
      "lang": "es",
      "value": "En ged, se presenta una posible corrupci\u00f3n de memoria debido a un manejo de errores incorrecto. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05838808; ID de Incidencia: ALPS05839556"
    }
  ],
  "id": "CVE-2022-20076",
  "lastModified": "2024-11-21T06:42:06.087",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-11T20:15:19.270",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-755"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877."
    },
    {
      "lang": "es",
      "value": "En netdiag, se presenta un posible seguimiento de enlaces simb\u00f3licos debido a una resoluci\u00f3n de enlaces inapropiada. Esto podr\u00eda conllevar a una escalada de privilegios local con privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: ALPS06308877; ID de Incidencia: ALPS06308877"
    }
  ],
  "id": "CVE-2022-20085",
  "lastModified": "2024-11-21T06:42:07.307",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T20:15:08.237",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-04 16:15
Modified
2024-11-21 06:41
Summary
In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6630:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC85BBB-5985-41A1-B19F-1C580C367B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7662t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3331F3A6-E176-4EA5-B253-D5B03945C2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C79211-F064-499D-914E-0BACD038FBF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E400AB9-B82A-4449-8789-35112940270F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AB22996-9C22-4B6C-9E94-E4C055D16335",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "140DAC08-96E9-47D3-BC2E-65E999DCFD50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2A6813-7138-441E-A9E4-FF62FCBD797A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "739BE124-C307-41B2-8E92-C223FE67F88A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608."
    },
    {
      "lang": "es",
      "value": "En Bluetooth, se presenta un posible bloqueo de la aplicaci\u00f3n debido a que bluetooth inunda un dispositivo con el paquete LMP_AU_rand. Esto podr\u00eda conllevar a una denegaci\u00f3n de servicio remota de bluetooth sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06198608; ID de Incidencia: ALPS06198608"
    }
  ],
  "id": "CVE-2022-20023",
  "lastModified": "2024-11-21T06:41:58.170",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-04T16:15:10.703",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-772"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-06-06 18:15
Modified
2024-11-21 06:45
Summary
In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464."
    },
    {
      "lang": "es",
      "value": "En WLAN driver, se presenta una posible lectura fuera de l\u00edmites debido a una comprobaci\u00f3n de l\u00edmites incorrecta. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local con los privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06545464; ID de incidencia: ALPS06545464"
    }
  ],
  "id": "CVE-2022-21755",
  "lastModified": "2024-11-21T06:45:22.530",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-06-06T18:15:08.973",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-04 16:15
Modified
2024-11-21 06:41
Summary
In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42CCA9-A835-4871-A129-B83573713AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620."
    },
    {
      "lang": "es",
      "value": "En libMtkOmxGsmDec, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a una comprobaci\u00f3n de l\u00edmites incorrecta. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05917620; ID de Incidencia: ALPS05917620"
    }
  ],
  "id": "CVE-2022-20019",
  "lastModified": "2024-11-21T06:41:57.627",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-04T16:15:10.493",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C38B265-3EE8-417C-9D59-6182939ED27E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C04171-DB18-40D7-AFC5-04A869942396",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "455B256C-83C8-406F-B28F-A4205E7C094E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FF926A-2D26-4666-ACA4-474A89243566",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC84405-17EE-4C25-8477-317F2A6A095F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6081A92B-4361-462A-9F7F-570AC7256CDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47E5EE7B-1208-4007-AF87-6DC309FFE312",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA834B63-F689-48BA-84E6-500351990BFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF1B3B37-22C4-42F4-8264-07512619D706",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11B89606-5FD7-4513-984A-16217D37BF4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F4FC23-534B-449A-8344-1F13AE9C8C57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "392C9A58-EAB1-44B5-B189-98C68CC23199",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EF507-52A0-45D1-AC26-97F765E691FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C826242C-440E-4D85-841E-570E9C69777C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "046B7E06-8C40-4D37-8D10-4816E51CA143",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "961C13C3-2C3D-46B1-A618-D45920EC5E95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62282860-5EAF-45EA-B36E-6B6F124C3096",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388."
    },
    {
      "lang": "es",
      "value": "En asf extractor, se presenta una posible lectura fuera de l\u00edmites debido a un desbordamiento del b\u00fafer de la pila. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05489178; ID del Problema: ALPS05561388."
    }
  ],
  "id": "CVE-2021-0622",
  "lastModified": "2024-11-21T05:43:02.173",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-18T15:15:08.230",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2021-0620
Vulnerability from cvelistv5
Published
2021-11-18 14:54
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.225Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-18T14:54:52",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0620",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/November-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0620",
    "datePublished": "2021-11-18T14:54:52",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.225Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20031
Vulnerability from cvelistv5
Published
2022-02-09 22:05
Modified
2024-08-03 01:55
Severity ?
Summary
In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.099Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:05:36",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20031",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/February-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20031",
    "datePublished": "2022-02-09T22:05:36",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.099Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20022
Vulnerability from cvelistv5
Published
2022-01-04 15:57
Modified
2024-08-03 01:55
Severity ?
Summary
In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT7662T, MT7663, MT7668, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8362B, MT8385, MT8765, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-01-04T15:57:18",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20022",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT7662T, MT7663, MT7668, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8362B, MT8385, MT8765, MT8788",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/January-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20022",
    "datePublished": "2022-01-04T15:57:18",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0425
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:40:01.056Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-27T11:20:45",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0425",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/September-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0425",
    "datePublished": "2021-09-27T11:20:45",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:40:01.056Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0424
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:40:01.167Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-27T11:20:39",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0424",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/September-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0424",
    "datePublished": "2021-09-27T11:20:39",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:40:01.167Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-21749
Vulnerability from cvelistv5
Published
2022-06-06 17:35
Modified
2024-08-03 02:53
Severity ?
Summary
In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:53:35.613Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-06-06T17:35:58",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-21749",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/June-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-21749",
    "datePublished": "2022-06-06T17:35:58",
    "dateReserved": "2021-11-26T00:00:00",
    "dateUpdated": "2024-08-03T02:53:35.613Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0624
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.237Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-18T14:55:53",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0624",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/November-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0624",
    "datePublished": "2021-11-18T14:55:53",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.237Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20053
Vulnerability from cvelistv5
Published
2022-03-09 17:02
Modified
2024-08-03 01:55
Severity ?
Summary
In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.334Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 9.0, 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-09T17:02:17",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20053",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 9.0, 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/March-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20053",
    "datePublished": "2022-03-09T17:02:17",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.334Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-21758
Vulnerability from cvelistv5
Published
2022-06-06 17:40
Modified
2024-08-03 02:53
Severity ?
Summary
In ccu, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06439600; Issue ID: ALPS06439600.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:53:36.299Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6833, MT6853, MT6873, MT6877, MT6885, MT6893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ccu, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06439600; Issue ID: ALPS06439600."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-06-06T17:40:07",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-21758",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6833, MT6853, MT6873, MT6877, MT6885, MT6893",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In ccu, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06439600; Issue ID: ALPS06439600."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/June-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-21758",
    "datePublished": "2022-06-06T17:40:07",
    "dateReserved": "2021-11-26T00:00:00",
    "dateUpdated": "2024-08-03T02:53:36.299Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0623
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.200Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8186, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-18T14:55:44",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0623",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8186, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/November-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0623",
    "datePublished": "2021-11-18T14:55:44",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.200Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20021
Vulnerability from cvelistv5
Published
2022-01-04 15:57
Modified
2024-08-03 01:55
Severity ?
Summary
In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.202Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT7662T, MT7663, MT7668, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8362B, MT8385, MT8765, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-01-04T15:57:13",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20021",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT7662T, MT7663, MT7668, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8362B, MT8385, MT8765, MT8788",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/January-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20021",
    "datePublished": "2022-01-04T15:57:13",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.202Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-21773
Vulnerability from cvelistv5
Published
2022-07-06 13:07
Modified
2024-08-03 02:53
Severity ?
Summary
In TEEI driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641388; Issue ID: ALPS06641388.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:53:35.620Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6755, MT6755S, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In TEEI driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641388; Issue ID: ALPS06641388."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-06T13:07:07",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-21773",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6755, MT6755S, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In TEEI driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641388; Issue ID: ALPS06641388."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/July-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-21773",
    "datePublished": "2022-07-06T13:07:07",
    "dateReserved": "2021-11-26T00:00:00",
    "dateUpdated": "2024-08-03T02:53:35.620Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20051
Vulnerability from cvelistv5
Published
2022-03-09 17:02
Modified
2024-08-03 01:55
Severity ?
Summary
In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.121Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-09T17:02:32",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20051",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/March-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20051",
    "datePublished": "2022-03-09T17:02:32",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.121Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0674
Vulnerability from cvelistv5
Published
2021-12-17 16:10
Modified
2024-08-03 15:47
Severity ?
Summary
In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.249Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6570, MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 8.1, 9.0, 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-17T16:10:17",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0674",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6570, MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 8.1, 9.0, 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/December-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0674",
    "datePublished": "2021-12-17T16:10:17",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.249Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-21755
Vulnerability from cvelistv5
Published
2022-06-06 17:39
Modified
2024-08-03 02:53
Severity ?
Summary
In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:53:36.244Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8667, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-06-06T17:39:06",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-21755",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8667, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In WLAN driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545464; Issue ID: ALPS06545464."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/June-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/June-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-21755",
    "datePublished": "2022-06-06T17:39:06",
    "dateReserved": "2021-11-26T00:00:00",
    "dateUpdated": "2024-08-03T02:53:36.244Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20075
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-11T19:38:06",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20075",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/April-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20075",
    "datePublished": "2022-04-11T19:38:07",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-26447
Vulnerability from cvelistv5
Published
2022-09-06 17:19
Modified
2024-08-03 05:03
Severity ?
Summary
In BT firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784478; Issue ID: ALPS06784478.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:03:32.907Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8385, MT8518, MT8532, MT8765, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0 and Yocto 3.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In BT firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784478; Issue ID: ALPS06784478."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Remote Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-06T17:19:04",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-26447",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6763, MT6771, MT8163, MT8167, MT8167S, MT8173, MT8183, MT8321, MT8362A, MT8385, MT8518, MT8532, MT8765, MT8788",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0 and Yocto 3.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In BT firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784478; Issue ID: ALPS06784478."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Remote Code Execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/September-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/September-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-26447",
    "datePublished": "2022-09-06T17:19:04",
    "dateReserved": "2022-03-04T00:00:00",
    "dateUpdated": "2024-08-03T05:03:32.907Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20085
Vulnerability from cvelistv5
Published
2022-05-03 19:57
Modified
2024-08-03 02:02
Severity ?
Summary
In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.573Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T19:57:05",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20085",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20085",
    "datePublished": "2022-05-03T19:57:05",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.573Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0422
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:40:01.116Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-27T11:20:27",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0422",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/September-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0422",
    "datePublished": "2021-09-27T11:20:27",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:40:01.116Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20084
Vulnerability from cvelistv5
Published
2022-05-03 19:55
Modified
2024-08-03 02:02
Severity ?
Summary
In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.518Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T19:55:34",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20084",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In telephony, there is a possible way to disable receiving emergency broadcasts due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498874; Issue ID: ALPS06498874."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20084",
    "datePublished": "2022-05-03T19:55:34",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.518Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20036
Vulnerability from cvelistv5
Published
2022-02-09 22:05
Modified
2024-08-03 01:55
Severity ?
Summary
In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171689; Issue ID: ALPS06171689.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.299Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171689; Issue ID: ALPS06171689."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:05:41",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20036",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171689; Issue ID: ALPS06171689."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/February-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20036",
    "datePublished": "2022-02-09T22:05:41",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.299Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0672
Vulnerability from cvelistv5
Published
2021-11-18 14:54
Modified
2024-08-03 15:47
Severity ?
Summary
In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.235Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://source.android.com/security/bulletin/2021-11-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Android",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android SoC"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-15T18:05:34",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://source.android.com/security/bulletin/2021-11-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0672",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Android",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android SoC"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://source.android.com/security/bulletin/2021-11-01",
              "refsource": "MISC",
              "url": "https://source.android.com/security/bulletin/2021-11-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0672",
    "datePublished": "2021-11-18T14:54:11",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.235Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20070
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:29.751Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-11T19:38:03",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20070",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In ssmr, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06362920; Issue ID: ALPS06362920."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/April-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20070",
    "datePublished": "2022-04-11T19:38:03",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:29.751Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20076
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.475Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-11T19:38:07",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20076",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/April-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20076",
    "datePublished": "2022-04-11T19:38:07",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.475Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20072
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In search engine service, there is a possible way to change the default search engine due to an incorrect comparison. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06219118; Issue ID: ALPS06219118.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.517Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6735, MT6737, MT6739, MT6753, MT6755, MT6755S, MT6761, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In search engine service, there is a possible way to change the default search engine due to an incorrect comparison. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06219118; Issue ID: ALPS06219118."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-11T19:38:04",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20072",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6735, MT6737, MT6739, MT6753, MT6755, MT6755S, MT6761, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In search engine service, there is a possible way to change the default search engine due to an incorrect comparison. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS06219118; Issue ID: ALPS06219118."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/April-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20072",
    "datePublished": "2022-04-11T19:38:04",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.517Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0675
Vulnerability from cvelistv5
Published
2021-12-15 18:05
Modified
2024-08-03 15:47
Severity ?
Summary
In alac decoder, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064258.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.238Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6570, MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 8.1, 9.0, 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In alac decoder, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064258."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-17T16:10:03",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0675",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6570, MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 8.1, 9.0, 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In alac decoder, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064258."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/December-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0675",
    "datePublished": "2021-12-15T18:05:52",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.238Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0621
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.224Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8184, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-18T14:55:03",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0621",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8184, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/November-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0621",
    "datePublished": "2021-11-18T14:55:03",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.224Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0611
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:47
Severity ?
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.038Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-27T11:20:56",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0611",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/September-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0611",
    "datePublished": "2021-09-27T11:20:56",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.038Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20067
Vulnerability from cvelistv5
Published
2022-04-11 19:37
Modified
2024-08-03 02:02
Severity ?
Summary
In mdp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836585; Issue ID: ALPS05836585.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:29.762Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6731, MT6735, MT6739, MT6750, MT6755, MT6755S, MT6757, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6885, MT6891, MT6893, MT8167, MT8167S, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 9.0, 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In mdp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836585; Issue ID: ALPS05836585."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-11T19:37:59",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20067",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6731, MT6735, MT6739, MT6750, MT6755, MT6755S, MT6757, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6885, MT6891, MT6893, MT8167, MT8167S, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 9.0, 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In mdp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836585; Issue ID: ALPS05836585."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/April-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20067",
    "datePublished": "2022-04-11T19:37:59",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:29.762Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0622
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.181Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-18T14:55:30",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0622",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/November-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0622",
    "datePublished": "2021-11-18T14:55:30",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.181Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20093
Vulnerability from cvelistv5
Published
2022-05-03 19:59
Modified
2024-08-03 02:02
Severity ?
Summary
In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.621Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T19:59:02",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20093",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20093",
    "datePublished": "2022-05-03T19:59:02",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.621Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20037
Vulnerability from cvelistv5
Published
2022-02-09 22:05
Modified
2024-08-03 01:55
Severity ?
Summary
In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.123Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:05:41",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20037",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8167, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/February-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20037",
    "datePublished": "2022-02-09T22:05:41",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.123Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0423
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:40:01.118Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-27T11:20:33",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0423",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/September-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0423",
    "datePublished": "2021-09-27T11:20:33",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:40:01.118Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0612
Vulnerability from cvelistv5
Published
2021-09-27 11:21
Modified
2024-08-03 15:47
Severity ?
Summary
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:27.962Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-27T11:21:03",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0612",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/September-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0612",
    "datePublished": "2021-09-27T11:21:03",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:27.962Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20019
Vulnerability from cvelistv5
Published
2022-01-04 15:56
Modified
2024-08-03 01:55
Severity ?
Summary
In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.134Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6595, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8768",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-01-04T15:56:57",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20019",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6595, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8768",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/January-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20019",
    "datePublished": "2022-01-04T15:56:57",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.134Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0610
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:47
Severity ?
Summary
In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:27.924Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-27T11:20:50",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0610",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/September-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0610",
    "datePublished": "2021-09-27T11:20:50",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:27.924Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20023
Vulnerability from cvelistv5
Published
2022-01-04 15:57
Modified
2024-08-03 01:55
Severity ?
Summary
In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.190Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT7662T, MT7663, MT7668, MT7915, MT7920, MT7921, MT7922, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8362B, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-01-04T15:57:24",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20023",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6630, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT7662T, MT7663, MT7668, MT7915, MT7920, MT7921, MT7922, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8362B, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/January-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20023",
    "datePublished": "2022-01-04T15:57:24",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.190Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0421
Vulnerability from cvelistv5
Published
2021-09-27 11:20
Modified
2024-08-03 15:40
Severity ?
Summary
In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:40:01.266Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-27T11:20:21",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0421",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/September-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/September-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0421",
    "datePublished": "2021-09-27T11:20:21",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:40:01.266Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}