All the vulnerabilites related to mediatek - mt7990
cve-2023-20820
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-09 15:32
Severity ?
Summary
In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:14:41.009Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6890",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7603",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7612",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7613",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7615",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7622",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7626:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7626",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7629",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7915",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7916",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7981",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7986",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt7990:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt7990",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "openwrt_19.07"
              },
              {
                "status": "affected",
                "version": "openwrt_2102"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20820",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-09T15:10:16.025434Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-09T15:32:54.982Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6890, MT7603, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986, MT7990",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "OpenWRT 19.07, 21.02"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-04T02:27:15.884Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-20820",
    "datePublished": "2023-09-04T02:27:15.884Z",
    "dateReserved": "2022-10-28T02:03:23.673Z",
    "dateUpdated": "2024-10-09T15:32:54.982Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2023-09-04 03:15
Modified
2024-11-21 07:41
Summary
In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A45CDA9-95E6-4C02-8C3C-3B0CF7272A6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2E9975-607D-4F06-A85A-B1C2BE3C5B75",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4979BA07-DC09-4DF8-BA7F-E4143A0ECFE6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05748BB1-0D48-4097-932E-E8E2E574FD8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55EB4B27-6264-45BE-9A22-BE8418BB0C06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7626:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C6A4C1-BAB5-4C53-91CF-2637C2ECF37F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29C210A3-C71E-4010-9DD6-9E36CADC9EED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AB22996-9C22-4B6C-9E94-E4C055D16335",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5AA441-5381-4179-89EB-1642120F72B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "490CD97B-021F-4350-AEE7-A2FA866D5889",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40A9E917-4B34-403F-B512-09EEBEA46811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt7990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4901B2A5-B0C8-4A0C-AC17-87D469744817",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189."
    },
    {
      "lang": "es",
      "value": "En wlan service, se presenta una posible inyecci\u00f3n de comando debido a una comprobaci\u00f3n de entrada inapropiada. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: WCNCR00244189; ID de la incidencia: WCNCR00244189."
    }
  ],
  "id": "CVE-2023-20820",
  "lastModified": "2024-11-21T07:41:36.537",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-04T03:15:07.840",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2023"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}