All the vulnerabilites related to mediatek - mt8735b
cve-2022-20068
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:29.756Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6799, MT6833, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6985, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-11T19:38:01",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20068",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6731, MT6732, MT6735, MT6737, MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6799, MT6833, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6985, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/April-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20068",
    "datePublished": "2022-04-11T19:38:01",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:29.756Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20091
Vulnerability from cvelistv5
Published
2022-05-03 19:58
Modified
2024-08-03 02:02
Severity ?
Summary
In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06226345.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.733Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8696, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06226345."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T19:58:31",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20091",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6731, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8696, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06226345."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20091",
    "datePublished": "2022-05-03T19:58:31",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.733Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20050
Vulnerability from cvelistv5
Published
2022-03-09 17:02
Modified
2024-08-03 01:55
Severity ?
Summary
In connsyslogger, there is a possible symbolic link following due to improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06335038; Issue ID: ALPS06335038.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.252Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6891, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8696, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In connsyslogger, there is a possible symbolic link following due to improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06335038; Issue ID: ALPS06335038."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-09T17:02:27",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20050",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6891, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8696, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In connsyslogger, there is a possible symbolic link following due to improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06335038; Issue ID: ALPS06335038."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/March-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20050",
    "datePublished": "2022-03-09T17:02:27",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.252Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20100
Vulnerability from cvelistv5
Published
2022-05-03 20:01
Modified
2024-08-03 02:02
Severity ?
Summary
In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06270804.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06270804."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T20:01:30",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20100",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06270804."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20100",
    "datePublished": "2022-05-03T20:01:30",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0624
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.237Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-18T14:55:53",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0624",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/November-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0624",
    "datePublished": "2021-11-18T14:55:53",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.237Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20055
Vulnerability from cvelistv5
Published
2022-03-09 17:02
Modified
2024-08-03 01:55
Severity ?
Summary
In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160830.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.141Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6762, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6893, MT8183, MT8185, MT8321, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160830."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-09T17:02:41",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20055",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6761, MT6762, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6893, MT8183, MT8185, MT8321, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160830."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/March-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20055",
    "datePublished": "2022-03-09T17:02:41",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.141Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20101
Vulnerability from cvelistv5
Published
2022-05-03 20:02
Modified
2024-08-03 02:02
Severity ?
Summary
In aee daemon, there is a possible information disclosure due to a path traversal. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06270870.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee daemon, there is a possible information disclosure due to a path traversal. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06270870."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T20:02:32",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20101",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee daemon, there is a possible information disclosure due to a path traversal. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06270870."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20101",
    "datePublished": "2022-05-03T20:02:32",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20083
Vulnerability from cvelistv5
Published
2022-07-06 13:05
Modified
2024-08-03 02:02
Severity ?
Summary
In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.449Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2731, MT2735, MT6297, MT6725, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6755, MT6757, MT6757P, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6797, MT6799, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR9, \nLR11, \nLR12, \nLR12A, \nLR13, \nNR15,\nNR16"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Remote Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-06T13:05:39",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20083",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT2731, MT2735, MT6297, MT6725, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6755, MT6757, MT6757P, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6797, MT6799, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Modem LR9, \nLR11, \nLR12, \nLR12A, \nLR13, \nNR15,\nNR16"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Remote Code Execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/July-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20083",
    "datePublished": "2022-07-06T13:05:39",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.449Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20090
Vulnerability from cvelistv5
Published
2022-05-03 19:58
Modified
2024-08-03 02:02
Severity ?
Summary
In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209197; Issue ID: ALPS06209197.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.639Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8696, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209197; Issue ID: ALPS06209197."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T19:58:12",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20090",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6731, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8696, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209197; Issue ID: ALPS06209197."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20090",
    "datePublished": "2022-05-03T19:58:12",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.639Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-21744
Vulnerability from cvelistv5
Published
2022-07-06 13:05
Modified
2024-08-03 02:53
Severity ?
Summary
In Modem 2G RR, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighbouring cell size with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00810064; Issue ID: ALPS06641626.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:53:35.802Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2731, MT2735, MT6297, MT6725, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6755, MT6757, MT6757P, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6797, MT6799, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR9, \nLR11, \nLR12, \nLR12A, \nLR13, \nNR15,\nNR16"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem 2G RR, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighbouring cell size with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00810064; Issue ID: ALPS06641626."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Remote Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-06T13:05:13",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-21744",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT2731, MT2735, MT6297, MT6725, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6755, MT6757, MT6757P, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6797, MT6799, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Modem LR9, \nLR11, \nLR12, \nLR12A, \nLR13, \nNR15,\nNR16"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Modem 2G RR, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighbouring cell size with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00810064; Issue ID: ALPS06641626."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Remote Code Execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/July-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-21744",
    "datePublished": "2022-07-06T13:05:13",
    "dateReserved": "2021-11-26T00:00:00",
    "dateUpdated": "2024-08-03T02:53:35.802Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20075
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-11T19:38:06",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20075",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/April-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20075",
    "datePublished": "2022-04-11T19:38:07",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-26468
Vulnerability from cvelistv5
Published
2022-09-06 17:19
Modified
2024-08-03 05:03
Severity ?
Summary
In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07168125; Issue ID: ALPS07168125.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:03:32.680Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/September-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6735, MT6739, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6885, MT6893, MT6895, MT6983, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07168125; Issue ID: ALPS07168125."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-06T17:19:08",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/September-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-26468",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6735, MT6739, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6885, MT6893, MT6895, MT6983, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07168125; Issue ID: ALPS07168125."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/September-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/September-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-26468",
    "datePublished": "2022-09-06T17:19:08",
    "dateReserved": "2022-03-04T00:00:00",
    "dateUpdated": "2024-08-03T05:03:32.680Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20088
Vulnerability from cvelistv5
Published
2022-05-03 19:57
Modified
2024-08-03 02:02
Severity ?
Summary
In aee driver, there is a possible reference count mistake due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06209201.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.784Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8696, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee driver, there is a possible reference count mistake due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06209201."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T19:57:39",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20088",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6731, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8696, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee driver, there is a possible reference count mistake due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06209201."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20088",
    "datePublished": "2022-05-03T19:57:39",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.784Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20060
Vulnerability from cvelistv5
Published
2022-03-09 17:03
Modified
2024-08-03 02:02
Severity ?
Summary
In preloader (usb), there is a possible permission bypass due to a missing proper image authentication. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06137462.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:29.761Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6762, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6875, MT6877, MT6885, MT6889, MT6893, MT8183, MT8185, MT8321, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In preloader (usb), there is a possible permission bypass due to a missing proper image authentication. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06137462."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-09T17:03:05",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20060",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6761, MT6762, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6875, MT6877, MT6885, MT6889, MT6893, MT8183, MT8185, MT8321, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In preloader (usb), there is a possible permission bypass due to a missing proper image authentication. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06137462."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/March-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20060",
    "datePublished": "2022-03-09T17:03:05",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:29.761Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0676
Vulnerability from cvelistv5
Published
2021-12-17 16:10
Modified
2024-08-03 15:47
Severity ?
Summary
In geniezone driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863009; Issue ID: ALPS05863009.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.289Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8771, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android 8.1, 9.0, 10.0, 11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In geniezone driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863009; Issue ID: ALPS05863009."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-17T16:10:06",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0676",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8771, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 8.1, 9.0, 10.0, 11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In geniezone driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863009; Issue ID: ALPS05863009."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/December-2021",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0676",
    "datePublished": "2021-12-17T16:10:06",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.289Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0672
Vulnerability from cvelistv5
Published
2021-11-18 14:54
Modified
2024-08-03 15:47
Severity ?
Summary
In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:47:28.235Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://source.android.com/security/bulletin/2021-11-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Android",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android SoC"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-15T18:05:34",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://source.android.com/security/bulletin/2021-11-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2021-0672",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Android",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android SoC"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://source.android.com/security/bulletin/2021-11-01",
              "refsource": "MISC",
              "url": "https://source.android.com/security/bulletin/2021-11-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2021-0672",
    "datePublished": "2021-11-18T14:54:11",
    "dateReserved": "2020-11-06T00:00:00",
    "dateUpdated": "2024-08-03T15:47:28.235Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20104
Vulnerability from cvelistv5
Published
2022-05-03 20:03
Modified
2024-08-03 02:02
Severity ?
Summary
In aee daemon, there is a possible information disclosure due to improper access control. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06284104.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.480Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee daemon, there is a possible information disclosure due to improper access control. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06284104."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T20:03:59",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20104",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee daemon, there is a possible information disclosure due to improper access control. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06284104."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20104",
    "datePublished": "2022-05-03T20:03:59",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.480Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20076
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 02:02
Severity ?
Summary
In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.475Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-11T19:38:07",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20076",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6731, MT6735, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8127, MT8135, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8312C, MT8312D, MT8321, MT8362A, MT8365, MT8382, MT8385, MT8389, MT8392, MT8392_90, MT8665, MT8685, MT8693, MT8735, MT8735B, MT8735M, MT8752, MT8765, MT8783, MT8785, MT8788",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/April-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20076",
    "datePublished": "2022-04-11T19:38:07",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.475Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20097
Vulnerability from cvelistv5
Published
2022-05-03 20:00
Modified
2024-08-03 02:02
Severity ?
Summary
In aee daemon, there is a possible information disclosure due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06383944.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.643Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee daemon, there is a possible information disclosure due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06383944."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T20:00:11",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20097",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee daemon, there is a possible information disclosure due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06383944."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20097",
    "datePublished": "2022-05-03T20:00:11",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.643Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20067
Vulnerability from cvelistv5
Published
2022-04-11 19:37
Modified
2024-08-03 02:02
Severity ?
Summary
In mdp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836585; Issue ID: ALPS05836585.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:29.762Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6731, MT6735, MT6739, MT6750, MT6755, MT6755S, MT6757, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6885, MT6891, MT6893, MT8167, MT8167S, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 9.0, 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In mdp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836585; Issue ID: ALPS05836585."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-11T19:37:59",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20067",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6731, MT6735, MT6739, MT6750, MT6755, MT6755S, MT6757, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6885, MT6891, MT6893, MT8167, MT8167S, MT8168, MT8173, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 9.0, 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In mdp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836585; Issue ID: ALPS05836585."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/April-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20067",
    "datePublished": "2022-04-11T19:37:59",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:29.762Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20102
Vulnerability from cvelistv5
Published
2022-05-03 20:02
Modified
2024-08-03 02:02
Severity ?
Summary
In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296405.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.553Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296405."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T20:02:58",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20102",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296405."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20102",
    "datePublished": "2022-05-03T20:02:58",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.553Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20103
Vulnerability from cvelistv5
Published
2022-05-03 20:03
Modified
2024-08-03 02:02
Severity ?
Summary
In aee daemon, there is a possible information disclosure due to symbolic link following. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06282684.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.487Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee daemon, there is a possible information disclosure due to symbolic link following. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06282684."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T20:03:27",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20103",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee daemon, there is a possible information disclosure due to symbolic link following. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06282684."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20103",
    "datePublished": "2022-05-03T20:03:27",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.487Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20056
Vulnerability from cvelistv5
Published
2022-03-09 17:02
Modified
2024-08-03 02:02
Severity ?
Summary
In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160820.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.454Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6762, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6893, MT8183, MT8185, MT8321, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160820."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-09T17:02:46",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20056",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6761, MT6762, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6893, MT8183, MT8185, MT8321, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160820."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/March-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20056",
    "datePublished": "2022-03-09T17:02:46",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.454Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20059
Vulnerability from cvelistv5
Published
2022-03-09 17:03
Modified
2024-08-03 02:02
Severity ?
Summary
In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160781.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:29.752Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6762, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6885, MT6889, MT6893, MT8183, MT8185, MT8321, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160781."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-09T17:03:00",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20059",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6761, MT6762, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6885, MT6889, MT6893, MT8183, MT8185, MT8321, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160781."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/March-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20059",
    "datePublished": "2022-03-09T17:03:00",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:29.752Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20089
Vulnerability from cvelistv5
Published
2022-05-03 19:57
Modified
2024-08-03 02:02
Severity ?
Summary
In aee driver, there is a possible memory corruption due to active debug code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06240397; Issue ID: ALPS06240397.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.792Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6731, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8695, MT8696, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee driver, there is a possible memory corruption due to active debug code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06240397; Issue ID: ALPS06240397."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T19:57:57",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20089",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6731, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8695, MT8696, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee driver, there is a possible memory corruption due to active debug code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06240397; Issue ID: ALPS06240397."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20089",
    "datePublished": "2022-05-03T19:57:57",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.792Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20058
Vulnerability from cvelistv5
Published
2022-03-09 17:02
Modified
2024-08-03 02:02
Severity ?
Summary
In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160485.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.666Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6762, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6893, MT8183, MT8185, MT8321, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160485."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-09T17:02:55",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20058",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6761, MT6762, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6893, MT8183, MT8185, MT8321, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160485."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/March-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20058",
    "datePublished": "2022-03-09T17:02:55",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.666Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20062
Vulnerability from cvelistv5
Published
2022-04-11 19:37
Modified
2024-08-03 02:02
Severity ?
Summary
In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836418; Issue ID: ALPS05836418.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:29.782Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6765, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6879, MT6885, MT6891, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836418; Issue ID: ALPS05836418."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-11T19:37:55",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20062",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6765, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6879, MT6885, MT6891, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836418; Issue ID: ALPS05836418."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/April-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20062",
    "datePublished": "2022-04-11T19:37:55",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:29.782Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20098
Vulnerability from cvelistv5
Published
2022-05-03 20:00
Modified
2024-08-03 02:02
Severity ?
Summary
In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06419017.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.440Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06419017."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T20:00:38",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20098",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06419017."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20098",
    "datePublished": "2022-05-03T20:00:38",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.440Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20052
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-03 01:55
Severity ?
Summary
In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS05836642; Issue ID: ALPS05836642.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.379Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6735, MT6737, MT6739, MT6750, MT6753, MT6755, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6890, MT6891, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS05836642; Issue ID: ALPS05836642."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-11T19:38:00",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20052",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6735, MT6737, MT6739, MT6750, MT6753, MT6755, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6890, MT6891, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS05836642; Issue ID: ALPS05836642."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/April-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20052",
    "datePublished": "2022-04-11T19:38:00",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.379Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20099
Vulnerability from cvelistv5
Published
2022-05-03 20:01
Modified
2024-08-03 02:02
Severity ?
Summary
In aee daemon, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296442.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:02:30.625Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee daemon, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296442."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T20:01:05",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20099",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In aee daemon, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296442."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/May-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20099",
    "datePublished": "2022-05-03T20:01:05",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T02:02:30.625Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-20029
Vulnerability from cvelistv5
Published
2022-02-09 22:05
Modified
2024-08-03 01:55
Severity ?
Summary
In cmdq driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05747150; Issue ID: ALPS05747150.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:55:46.106Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8163, MT8167, MT8168, MT8173, MT8175, MT8183, MT8321, MT8362A, MT8365, MT8385, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8791, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 10.0, 11.0, 12.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In cmdq driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05747150; Issue ID: ALPS05747150."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:05:35",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mediatek.com",
          "ID": "CVE-2022-20029",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8163, MT8167, MT8168, MT8173, MT8175, MT8183, MT8321, MT8362A, MT8365, MT8385, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8791, MT8797",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android 10.0, 11.0, 12.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "MediaTek, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In cmdq driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05747150; Issue ID: ALPS05747150."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://corp.mediatek.com/product-security-bulletin/February-2022",
              "refsource": "MISC",
              "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2022-20029",
    "datePublished": "2022-02-09T22:05:35",
    "dateReserved": "2021-10-12T00:00:00",
    "dateUpdated": "2024-08-03T01:55:46.106Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Summary
In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160485.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160485."
    },
    {
      "lang": "es",
      "value": "En preloader (usb), se presenta una posible escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una escalada local de privilegios, para un atacante que tenga acceso f\u00edsico al dispositivo, sin ser necesarios privilegios de ejecuci\u00f3n adicionales. Es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06160806; ID de Incidencia: ALPS06160485"
    }
  ],
  "id": "CVE-2022-20058",
  "lastModified": "2024-11-21T06:42:03.090",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-10T17:45:06.813",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907."
    },
    {
      "lang": "es",
      "value": "En mobile_log_d, se presenta un posible seguimiento de enlaces simb\u00f3licos debido a una resoluci\u00f3n de enlaces inapropiada. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06308907; ID de Incidencia: ALPS06308907"
    }
  ],
  "id": "CVE-2022-20068",
  "lastModified": "2024-11-21T06:42:04.427",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-11T20:15:18.957",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In aee driver, there is a possible reference count mistake due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06209201.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee driver, there is a possible reference count mistake due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06209201."
    },
    {
      "lang": "es",
      "value": "En aee driver, se presenta un posible error en el recuento de referencias debido a un manejo incorrecto de errores. Esto podr\u00eda conllevar a una escalada de privilegios local con privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06209201; ID de Incidencia: ALPS06209201"
    }
  ],
  "id": "CVE-2022-20088",
  "lastModified": "2024-11-21T06:42:07.573",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T20:15:08.317",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-755"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 21:15
Modified
2024-11-21 06:42
Summary
In aee daemon, there is a possible information disclosure due to a path traversal. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06270870.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee daemon, there is a possible information disclosure due to a path traversal. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06270870."
    },
    {
      "lang": "es",
      "value": "En aee daemon, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a un salto de ruta. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06419017; ID de Incidencia: ALPS06270870"
    }
  ],
  "id": "CVE-2022-20101",
  "lastModified": "2024-11-21T06:42:09.340",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T21:15:08.927",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-07-06 14:15
Modified
2024-11-21 06:42
Severity ?
Summary
In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEBC79B-E936-4499-8B2D-C6619C51B755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EA5EB6-EBC1-4660-9E03-616CDB25C417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12318A0A-16CD-48A5-98A4-373070734642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "387D7FC2-2146-4565-9B9B-D84EF686DBA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6528FA05-C8B7-498B-93BE-0BEFED28C1FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6725:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEE78CC-80F8-4C4F-92BA-378AAA85F087",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424A75C9-2A15-4B00-B0B7-703A4840CC1D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0002C537-4268-43CA-B349-BC14F1F0313C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE80B083-D5A3-418C-9655-C79C9DECB4C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3367BA13-9C4D-4CCF-8E71-397F33CFF773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1BE913-70AE-49FE-99E9-E996165DF79D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C387CFFD-BAE4-4626-8AC3-7C9CFB6819FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883."
    },
    {
      "lang": "es",
      "value": "En Modem 2G/3G CC, es posible sea producida una escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo remota cuando es descodificada FACILITY combinada sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: MOLY00803883; ID de Incidencia: MOLY00803883"
    }
  ],
  "id": "CVE-2022-20083",
  "lastModified": "2024-11-21T06:42:07.020",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-06T14:15:16.980",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS05836642; Issue ID: ALPS05836642.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS05836642; Issue ID: ALPS05836642."
    },
    {
      "lang": "es",
      "value": "En mdp, se presenta una posible corrupci\u00f3n de memoria debido a un uso de memoria previamente liberada. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. Es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05836642; ID de Incidencia: ALPS05836642"
    }
  ],
  "id": "CVE-2022-20052",
  "lastModified": "2024-11-21T06:42:02.207",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.6,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-11T20:15:18.667",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Summary
In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160781.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160781."
    },
    {
      "lang": "es",
      "value": "En preloader (usb), se presenta una posible escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una escalada local de privilegios, para un atacante que tenga acceso f\u00edsico al dispositivo, sin ser necesarios privilegios de ejecuci\u00f3n adicionales. Es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06160806; ID de Incidencia: ALPS06160781"
    }
  ],
  "id": "CVE-2022-20059",
  "lastModified": "2024-11-21T06:42:03.260",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-10T17:45:07.237",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988."
    },
    {
      "lang": "es",
      "value": "En flv extractor, se presenta una posible lectura fuera de l\u00edmites debido a un desbordamiento del b\u00fafer de la pila. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05594988; ID del Problema: ALPS05594988."
    }
  ],
  "id": "CVE-2021-0624",
  "lastModified": "2024-11-21T05:43:02.423",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-18T15:15:08.343",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/November-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Summary
In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160820.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160820."
    },
    {
      "lang": "es",
      "value": "En preloader (usb), es posible que sea producida una escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una escalada local de privilegios, para un atacante que tenga acceso f\u00edsico al dispositivo, sin ser necesarios privilegios de ejecuci\u00f3n adicionales. Es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06160806; ID de Incidencia: ALPS06160820"
    }
  ],
  "id": "CVE-2022-20056",
  "lastModified": "2024-11-21T06:42:02.780",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-10T17:45:05.983",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06419017.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06419017."
    },
    {
      "lang": "es",
      "value": "En aee daemon, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a una falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06419017; ID de Incidencia: ALPS06419017"
    }
  ],
  "id": "CVE-2022-20098",
  "lastModified": "2024-11-21T06:42:08.927",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T20:15:08.743",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Summary
In preloader (usb), there is a possible permission bypass due to a missing proper image authentication. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06137462.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In preloader (usb), there is a possible permission bypass due to a missing proper image authentication. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06137462."
    },
    {
      "lang": "es",
      "value": "En preloader (usb), se presenta una posible omisi\u00f3n de permisos debido a una falta de autenticaci\u00f3n de imagen apropiada. Esto podr\u00eda conllevar a una escalada local de privilegios, para un atacante que tenga acceso f\u00edsico al dispositivo, sin ser necesarios privilegios de ejecuci\u00f3n adicionales. Es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06160806; ID de Incidencia: ALPS06137462"
    }
  ],
  "id": "CVE-2022-20060",
  "lastModified": "2024-11-21T06:42:03.423",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-10T17:45:07.660",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Summary
In connsyslogger, there is a possible symbolic link following due to improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06335038; Issue ID: ALPS06335038.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In connsyslogger, there is a possible symbolic link following due to improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06335038; Issue ID: ALPS06335038."
    },
    {
      "lang": "es",
      "value": "En connsyslogger, se presenta un posible seguimiento de enlaces simb\u00f3licos debido a una resoluci\u00f3n inapropiada de enlaces. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06335038; ID de Incidencia: ALPS06335038"
    }
  ],
  "id": "CVE-2022-20050",
  "lastModified": "2024-11-21T06:42:01.933",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-10T17:45:03.597",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-10 17:45
Modified
2024-11-21 06:42
Summary
In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160830.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160830."
    },
    {
      "lang": "es",
      "value": "En preloader (usb), se presenta una posible escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una escalada local de privilegios, para un atacante que tenga acceso f\u00edsico al dispositivo, sin ser necesarios privilegios de ejecuci\u00f3n adicionales. Es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06160806; ID de Incidencia: ALPS06160830"
    }
  ],
  "id": "CVE-2022-20055",
  "lastModified": "2024-11-21T06:42:02.640",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-10T17:45:05.580",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/March-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836418; Issue ID: ALPS05836418.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836418; Issue ID: ALPS05836418."
    },
    {
      "lang": "es",
      "value": "En mdp, se presenta una posible corrupci\u00f3n de memoria debido a un uso de memoria previamente liberada. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05836418; ID de Incidencia: ALPS05836418"
    }
  ],
  "id": "CVE-2022-20062",
  "lastModified": "2024-11-21T06:42:03.600",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-11T20:15:18.720",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In aee driver, there is a possible memory corruption due to active debug code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06240397; Issue ID: ALPS06240397.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee driver, there is a possible memory corruption due to active debug code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06240397; Issue ID: ALPS06240397."
    },
    {
      "lang": "es",
      "value": "En aee driver, se presenta una posible corrupci\u00f3n de memoria debido al c\u00f3digo de depuraci\u00f3n activo. Esto podr\u00eda conllevar a una escalada de privilegios local con privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06240397; ID de Incidencia: ALPS06240397"
    }
  ],
  "id": "CVE-2022-20089",
  "lastModified": "2024-11-21T06:42:07.727",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T20:15:08.357",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 21:15
Modified
2024-11-21 06:42
Summary
In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296405.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296405."
    },
    {
      "lang": "es",
      "value": "En aee daemon, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a una falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06296442; ID de Incidencia: ALPS06296405"
    }
  ],
  "id": "CVE-2022-20102",
  "lastModified": "2024-11-21T06:42:09.477",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T21:15:08.977",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-07-06 14:15
Modified
2024-11-21 06:45
Severity ?
Summary
In Modem 2G RR, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighbouring cell size with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00810064; Issue ID: ALPS06641626.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEBC79B-E936-4499-8B2D-C6619C51B755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EA5EB6-EBC1-4660-9E03-616CDB25C417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12318A0A-16CD-48A5-98A4-373070734642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:lr9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "387D7FC2-2146-4565-9B9B-D84EF686DBA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6528FA05-C8B7-498B-93BE-0BEFED28C1FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6725:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEE78CC-80F8-4C4F-92BA-378AAA85F087",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424A75C9-2A15-4B00-B0B7-703A4840CC1D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0002C537-4268-43CA-B349-BC14F1F0313C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE80B083-D5A3-418C-9655-C79C9DECB4C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3367BA13-9C4D-4CCF-8E71-397F33CFF773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1BE913-70AE-49FE-99E9-E996165DF79D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C387CFFD-BAE4-4626-8AC3-7C9CFB6819FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Modem 2G RR, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighbouring cell size with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00810064; Issue ID: ALPS06641626."
    },
    {
      "lang": "es",
      "value": "En Modem 2G RR, es posible sea producida una escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo remota cuando son descodificados datos de celdas vecinas de paquetes GPRS (PNCD) de tama\u00f1o inapropiado sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: MOLY00810064; ID de Incidencia: ALPS06641626"
    }
  ],
  "id": "CVE-2022-21744",
  "lastModified": "2024-11-21T06:45:21.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-06T14:15:17.027",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/July-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:41
Summary
In cmdq driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05747150; Issue ID: ALPS05747150.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In cmdq driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05747150; Issue ID: ALPS05747150."
    },
    {
      "lang": "es",
      "value": "En cmdq driver, se presenta una posible lectura fuera de l\u00edmites debido a una comprobaci\u00f3n de l\u00edmites incorrecta. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: ALPS05747150; ID de Incidencia: ALPS05747150"
    }
  ],
  "id": "CVE-2022-20029",
  "lastModified": "2024-11-21T06:41:58.947",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:17.077",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 21:15
Modified
2024-11-21 06:42
Summary
In aee daemon, there is a possible information disclosure due to symbolic link following. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06282684.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee daemon, there is a possible information disclosure due to symbolic link following. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06282684."
    },
    {
      "lang": "es",
      "value": "En aee daemon, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a un seguimiento de enlaces simb\u00f3licos. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06383944; ID de Incidencia: ALPS06282684"
    }
  ],
  "id": "CVE-2022-20103",
  "lastModified": "2024-11-21T06:42:09.610",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T21:15:09.027",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In aee daemon, there is a possible information disclosure due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06383944.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee daemon, there is a possible information disclosure due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06383944."
    },
    {
      "lang": "es",
      "value": "En aee daemon, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a una condici\u00f3n de carrera. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06383944; ID de Incidencia: ALPS06383944"
    }
  ],
  "id": "CVE-2022-20097",
  "lastModified": "2024-11-21T06:42:08.793",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.9,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T20:15:08.703",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 21:15
Modified
2024-11-21 06:42
Summary
In aee daemon, there is a possible information disclosure due to improper access control. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06284104.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee daemon, there is a possible information disclosure due to improper access control. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06284104."
    },
    {
      "lang": "es",
      "value": "En aee daemon, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a un control de acceso inapropiado. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: ALPS06419017; ID de Incidencia: ALPS06284104"
    }
  ],
  "id": "CVE-2022-20104",
  "lastModified": "2024-11-21T06:42:09.773",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T21:15:09.073",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8127:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD7BDC63-3963-4C4D-B547-2936006926E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8135:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "182A995C-2453-4DF2-ABCC-A885D8C334C0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5B22E8-3536-4DBC-8E71-3E14FE45A887",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8312c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39915BEC-73D4-46B7-B52C-CED910AF3CA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8312d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF828C6-4B05-4E12-9B78-782F1F062F39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8382:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B7F410-9623-4878-AF8B-CB1E68B9C555",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8389:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61E84418-3D52-4C5B-919A-2C3EA3A20BC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8392:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2FE1D80-FBA8-452B-AAD1-A7BC430B44B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8392_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB784A7D-1B24-48FC-BC42-0F646BBD0B58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8665:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "367725BC-DE40-40F1-A59A-C4286CA9C0D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8685:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED17AD2-3B65-48EE-A56E-FEA4A5F38B8C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8693:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA2890F-59A8-4CAB-BDFA-883F8A38CE4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91F81E5-29D3-4BA7-9476-EBD644F7E4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3FC505E-CF02-4F29-8D17-0E0C05433B0D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2FD7E95-F0D4-492E-BB92-2597FB9D2884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "584F2DD7-F353-4156-BFAB-AE6DF5BB9251",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05838808."
    },
    {
      "lang": "es",
      "value": "En ged, se presenta una posible escritura fuera de l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05838808; ID de Incidencia: ALPS05838808"
    }
  ],
  "id": "CVE-2022-20075",
  "lastModified": "2024-11-21T06:42:05.940",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-11T20:15:19.227",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209197; Issue ID: ALPS06209197.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209197; Issue ID: ALPS06209197."
    },
    {
      "lang": "es",
      "value": "En aee driver, se presenta un posible uso de memoria previamente liberada debido a una condici\u00f3n de carrera. Esto podr\u00eda conllevar a una escalada de privilegios local con privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06209197; ID de Incidencia: ALPS06209197"
    }
  ],
  "id": "CVE-2022-20090",
  "lastModified": "2024-11-21T06:42:07.863",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T20:15:08.400",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        },
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-06 18:15
Modified
2024-11-21 06:54
Summary
In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07168125; Issue ID: ALPS07168125.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07168125; Issue ID: ALPS07168125."
    },
    {
      "lang": "es",
      "value": "En preloader (usb), se presenta una posible escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una escalada de privilegios local, para un atacante que tenga acceso f\u00edsico al dispositivo, sin ser necesarios privilegios de ejecuci\u00f3n adicionales. Es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS07168125; ID de Incidencia: ALPS07168125."
    }
  ],
  "id": "CVE-2022-26468",
  "lastModified": "2024-11-21T06:54:00.417",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-06T18:15:12.577",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/September-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In mdp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836585; Issue ID: ALPS05836585.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In mdp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836585; Issue ID: ALPS05836585."
    },
    {
      "lang": "es",
      "value": "En mdp, se presenta una posible escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una escalada local de privilegios con los privilegios de ejecuci\u00f3n System requeridos. No es necesaria la interacci\u00f3n del usuario para la explotaci\u00f3n. ID del Parche: ALPS05836585; ID de Incidencia: ALPS05836585"
    }
  ],
  "id": "CVE-2022-20067",
  "lastModified": "2024-11-21T06:42:04.293",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-11T20:15:18.917",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FBCBDD-5ADA-49A7-A152-61FB909EE5FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C9D91-A64F-446E-BC14-7C79B770C3A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C2668D-7A14-42AA-A164-957FE78B9ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BE9434-12D6-4801-8B04-7F18AF58E717",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15C285A-0A26-46F7-9D72-CCADC47D93B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "809FEAD7-F02B-48A9-B442-28B46C7806C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7CC141-E2D6-4F28-B6F0-167E11869CD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035"
    },
    {
      "lang": "es",
      "value": "En la aplicaci\u00f3n Browser, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a la falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n.Producto: AndroidVersiones: Android SoCAndroid ID: A-199678035"
    }
  ],
  "id": "CVE-2021-0672",
  "lastModified": "2024-11-21T05:43:07.290",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-18T15:15:09.210",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://source.android.com/security/bulletin/2021-11-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://source.android.com/security/bulletin/2021-11-01"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In aee daemon, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296442.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee daemon, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296442."
    },
    {
      "lang": "es",
      "value": "En aee daemon, es posible que se produzca una escritura fuera de l\u00edmites debido a una comprobaci\u00f3n de entrada inapropiada. Esto podr\u00eda conllevar a una escalada de privilegios local con privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06296442; ID de Incidencia: ALPS06296442"
    }
  ],
  "id": "CVE-2022-20099",
  "lastModified": "2024-11-21T06:42:09.057",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T20:15:08.787",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:42
Summary
In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8127:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD7BDC63-3963-4C4D-B547-2936006926E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8135:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "182A995C-2453-4DF2-ABCC-A885D8C334C0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5B22E8-3536-4DBC-8E71-3E14FE45A887",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8312c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39915BEC-73D4-46B7-B52C-CED910AF3CA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8312d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF828C6-4B05-4E12-9B78-782F1F062F39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8382:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B7F410-9623-4878-AF8B-CB1E68B9C555",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8389:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61E84418-3D52-4C5B-919A-2C3EA3A20BC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8392:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2FE1D80-FBA8-452B-AAD1-A7BC430B44B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8392_90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB784A7D-1B24-48FC-BC42-0F646BBD0B58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8665:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "367725BC-DE40-40F1-A59A-C4286CA9C0D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8685:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED17AD2-3B65-48EE-A56E-FEA4A5F38B8C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8693:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA2890F-59A8-4CAB-BDFA-883F8A38CE4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91F81E5-29D3-4BA7-9476-EBD644F7E4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8752:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3FC505E-CF02-4F29-8D17-0E0C05433B0D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8783:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2FD7E95-F0D4-492E-BB92-2597FB9D2884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "584F2DD7-F353-4156-BFAB-AE6DF5BB9251",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In ged, there is a possible memory corruption due to an incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05838808; Issue ID: ALPS05839556."
    },
    {
      "lang": "es",
      "value": "En ged, se presenta una posible corrupci\u00f3n de memoria debido a un manejo de errores incorrecto. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local con los privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05838808; ID de Incidencia: ALPS05839556"
    }
  ],
  "id": "CVE-2022-20076",
  "lastModified": "2024-11-21T06:42:06.087",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-11T20:15:19.270",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/April-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-755"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06226345.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06226345."
    },
    {
      "lang": "es",
      "value": "En aee driver, se presenta un posible uso de memoria previamente liberada debido a una condici\u00f3n de carrera. Esto podr\u00eda conllevar a una escalada de privilegios local con privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06209201; ID de Incidencia: ALPS06226345"
    }
  ],
  "id": "CVE-2022-20091",
  "lastModified": "2024-11-21T06:42:08.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T20:15:08.447",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        },
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-12-17 17:15
Modified
2024-11-21 05:43
Summary
In geniezone driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863009; Issue ID: ALPS05863009.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A7A805-EFED-47B3-884C-158FF1EECAEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In geniezone driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863009; Issue ID: ALPS05863009."
    },
    {
      "lang": "es",
      "value": "En el controlador geniezone, se presenta una posible lectura fuera de l\u00edmites debido a una comprobaci\u00f3n de l\u00edmites incorrecta. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n System requeridos. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS05863009; ID de Incidencia: ALPS05863009"
    }
  ],
  "id": "CVE-2021-0676",
  "lastModified": "2024-11-21T05:43:07.780",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-12-17T17:15:10.933",
  "references": [
    {
      "source": "security@android.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/December-2021"
    }
  ],
  "sourceIdentifier": "security@android.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-03 20:15
Modified
2024-11-21 06:42
Summary
In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06270804.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433723EF-FB44-4233-B334-AB9C9D9B0AFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06270804."
    },
    {
      "lang": "es",
      "value": "En aee daemon, se presenta una posible divulgaci\u00f3n de informaci\u00f3n debido a una falta de comprobaci\u00f3n de permisos. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n System necesarios. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06383944; ID de Incidencia: ALPS06270804"
    }
  ],
  "id": "CVE-2022-20100",
  "lastModified": "2024-11-21T06:42:09.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-03T20:15:08.827",
  "references": [
    {
      "source": "security@mediatek.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://corp.mediatek.com/product-security-bulletin/May-2022"
    }
  ],
  "sourceIdentifier": "security@mediatek.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}