All the vulnerabilites related to mediatek - mt7626
Vulnerability from fkie_nvd
Published
2024-01-02 03:15
Modified
2024-11-21 08:04
Severity ?
Summary
In wlan driver, there is a possible PIN crack due to use of insufficiently random values. This could lead to local information disclosure with no execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00325055; Issue ID: MSV-868.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mediatek:software_development_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "70C1BCD5-180E-410C-A434-F6313616E7E6", "versionEndIncluding": "7.6.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF2E9975-607D-4F06-A85A-B1C2BE3C5B75", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*", "matchCriteriaId": "4979BA07-DC09-4DF8-BA7F-E4143A0ECFE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*", "matchCriteriaId": "05748BB1-0D48-4097-932E-E8E2E574FD8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*", "matchCriteriaId": "55EB4B27-6264-45BE-9A22-BE8418BB0C06", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7626:-:*:*:*:*:*:*:*", "matchCriteriaId": "79C6A4C1-BAB5-4C53-91CF-2637C2ECF37F", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*", "matchCriteriaId": "29C210A3-C71E-4010-9DD6-9E36CADC9EED", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AB22996-9C22-4B6C-9E94-E4C055D16335", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD5AA441-5381-4179-89EB-1642120F72B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*", "matchCriteriaId": "490CD97B-021F-4350-AEE7-A2FA866D5889", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*", "matchCriteriaId": "40A9E917-4B34-403F-B512-09EEBEA46811", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In wlan driver, there is a possible PIN crack due to use of insufficiently random values. This could lead to local information disclosure with no execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00325055; Issue ID: MSV-868." }, { "lang": "es", "value": "En el controlador WLAN, existe una posible vulneraci\u00f3n del PIN debido al uso de valores insuficientemente aleatorios. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: WCNCR00325055; ID del problema: MSV-868." } ], "id": "CVE-2023-32831", "lastModified": "2024-11-21T08:04:08.440", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-02T03:15:07.720", "references": [ { "source": "security@mediatek.com", "tags": [ "Vendor Advisory" ], "url": "https://corp.mediatek.com/product-security-bulletin/January-2024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://corp.mediatek.com/product-security-bulletin/January-2024" } ], "sourceIdentifier": "security@mediatek.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Severity ?
Summary
In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openwrt | openwrt | 19.07.0 | |
openwrt | openwrt | 21.02.0 | |
mediatek | mt6890 | - | |
mediatek | mt7603 | - | |
mediatek | mt7612 | - | |
mediatek | mt7613 | - | |
mediatek | mt7615 | - | |
mediatek | mt7622 | - | |
mediatek | mt7626 | - | |
mediatek | mt7629 | - | |
mediatek | mt7915 | - | |
mediatek | mt7916 | - | |
mediatek | mt7981 | - | |
mediatek | mt7986 | - | |
mediatek | mt7990 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*", "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A", "vulnerable": true }, { "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*", "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A45CDA9-95E6-4C02-8C3C-3B0CF7272A6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF2E9975-607D-4F06-A85A-B1C2BE3C5B75", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*", "matchCriteriaId": "4979BA07-DC09-4DF8-BA7F-E4143A0ECFE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*", "matchCriteriaId": "05748BB1-0D48-4097-932E-E8E2E574FD8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*", "matchCriteriaId": "55EB4B27-6264-45BE-9A22-BE8418BB0C06", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7626:-:*:*:*:*:*:*:*", "matchCriteriaId": "79C6A4C1-BAB5-4C53-91CF-2637C2ECF37F", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*", "matchCriteriaId": "29C210A3-C71E-4010-9DD6-9E36CADC9EED", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AB22996-9C22-4B6C-9E94-E4C055D16335", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD5AA441-5381-4179-89EB-1642120F72B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*", "matchCriteriaId": "490CD97B-021F-4350-AEE7-A2FA866D5889", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*", "matchCriteriaId": "40A9E917-4B34-403F-B512-09EEBEA46811", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7990:-:*:*:*:*:*:*:*", "matchCriteriaId": "4901B2A5-B0C8-4A0C-AC17-87D469744817", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189." }, { "lang": "es", "value": "En wlan service, se presenta una posible inyecci\u00f3n de comando debido a una comprobaci\u00f3n de entrada inapropiada. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: WCNCR00244189; ID de la incidencia: WCNCR00244189." } ], "id": "CVE-2023-20820", "lastModified": "2024-11-21T07:41:36.537", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-04T03:15:07.840", "references": [ { "source": "security@mediatek.com", "tags": [ "Vendor Advisory" ], "url": "https://corp.mediatek.com/product-security-bulletin/September-2023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://corp.mediatek.com/product-security-bulletin/September-2023" } ], "sourceIdentifier": "security@mediatek.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2023-20820
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-09 15:32
Severity ?
EPSS score ?
Summary
In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | MediaTek, Inc. | MT6890, MT7603, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986, MT7990 |
Version: OpenWRT 19.07, 21.02 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:14:41.009Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://corp.mediatek.com/product-security-bulletin/September-2023" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt6890", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7603", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7612", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7613", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7615", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7622", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7626:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7626", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7629", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7915", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7916", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7981", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7986", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7990:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7990", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-20820", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T15:10:16.025434Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T15:32:54.982Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "MT6890, MT7603, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986, MT7990", "vendor": "MediaTek, Inc.", "versions": [ { "status": "affected", "version": "OpenWRT 19.07, 21.02" } ] } ], "descriptions": [ { "lang": "en", "value": "In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-04T02:27:15.884Z", "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "shortName": "MediaTek" }, "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/September-2023" } ] } }, "cveMetadata": { "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "assignerShortName": "MediaTek", "cveId": "CVE-2023-20820", "datePublished": "2023-09-04T02:27:15.884Z", "dateReserved": "2022-10-28T02:03:23.673Z", "dateUpdated": "2024-10-09T15:32:54.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32831
Vulnerability from cvelistv5
Published
2024-01-02 02:50
Modified
2024-08-02 15:25
Severity ?
EPSS score ?
Summary
In wlan driver, there is a possible PIN crack due to use of insufficiently random values. This could lead to local information disclosure with no execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00325055; Issue ID: MSV-868.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | MediaTek, Inc. | MT6890, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986 |
Version: SDK version 7.6.7.1 and before |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:37.007Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://corp.mediatek.com/product-security-bulletin/January-2024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MT6890, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986", "vendor": "MediaTek, Inc.", "versions": [ { "status": "affected", "version": "SDK version 7.6.7.1 and before" } ] } ], "descriptions": [ { "lang": "en", "value": "In wlan driver, there is a possible PIN crack due to use of insufficiently random values. This could lead to local information disclosure with no execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00325055; Issue ID: MSV-868." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-02T02:50:09.278Z", "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "shortName": "MediaTek" }, "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/January-2024" } ] } }, "cveMetadata": { "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "assignerShortName": "MediaTek", "cveId": "CVE-2023-32831", "datePublished": "2024-01-02T02:50:09.278Z", "dateReserved": "2023-05-16T03:04:32.150Z", "dateUpdated": "2024-08-02T15:25:37.007Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }