Vulnerabilites related to mediatek - mt9649
cve-2024-20002
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2024-08-01 21:52
Severity ?
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961715; Issue ID: DTV03961715.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T21:52:31.242Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5583, MT5586, MT5691, MT5695, MT5696, MT9010, MT9011, MT9012, MT9015, MT9016, MT9020, MT9021, MT9022, MT9025, MT9026, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9286, MT9288, MT9602, MT9603, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9618, MT9629, MT9630, MT9631, MT9632, MT9633, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9660, MT9666, MT9667, MT9669, MT9671, MT9675, MT9679, MT9685, MT9686, MT9688, MT9689",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0, 14.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961715; Issue ID: DTV03961715.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-05T05:59:42.613Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2024-20002",
      datePublished: "2024-02-05T05:59:42.613Z",
      dateReserved: "2023-11-02T13:35:35.146Z",
      dateUpdated: "2024-08-01T21:52:31.242Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20738
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-07 21:15
Summary
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645173.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.967Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20738",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-07T21:15:02.286724Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-07T21:15:07.999Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5696, MT5836, MT5838, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8168, MT8175, MT8195, MT8365, MT8395, MT8673, MT8781, MT8786, MT8789, MT8791T, MT8797, MT9000, MT9015, MT9023, MT9025, MT9618, MT9649, MT9653, MT9679, MT9687, MT9689, MT9902, MT9932, MT9952, MT9972, MT9982",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645173.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-06T12:11:27.204Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20738",
      datePublished: "2023-06-06T12:11:27.204Z",
      dateReserved: "2022-10-28T02:03:10.767Z",
      dateUpdated: "2025-01-07T21:15:07.999Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20811
Vulnerability from cvelistv5
Published
2023-08-07 03:22
Modified
2024-12-04 15:11
Severity ?
Summary
In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.212Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20811",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-12-04T15:11:33.415387Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-04T15:11:49.404Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5221, MT5583, MT5691, MT5695, MT9010, MT9011, MT9012, MT9016, MT9020, MT9021, MT9022, MT9030, MT9031, MT9032, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9286, MT9288, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9618, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9666, MT9667, MT9669, MT9671, MT9675, MT9685, MT9686, MT9688",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0 / Linux 4.19",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-07T03:22:00.788Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20811",
      datePublished: "2023-08-07T03:22:00.788Z",
      dateReserved: "2022-10-28T02:03:23.672Z",
      dateUpdated: "2024-12-04T15:11:49.404Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20810
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:27
Severity ?
Summary
In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.000Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20810",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-17T14:27:16.034002Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-17T14:27:33.720Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5221, MT5583, MT5691, MT5695, MT9010, MT9011, MT9012, MT9016, MT9020, MT9021, MT9022, MT9030, MT9031, MT9032, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9286, MT9288, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9618, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9666, MT9667, MT9669, MT9671, MT9675, MT9685, MT9686, MT9688",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0 / Linux 4.19",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-07T03:21:58.826Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20810",
      datePublished: "2023-08-07T03:21:58.826Z",
      dateReserved: "2022-10-28T02:03:23.672Z",
      dateUpdated: "2024-10-17T14:27:33.720Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20734
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-08 14:54
Summary
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645184.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.846Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20734",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-08T14:54:38.828219Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-08T14:54:47.136Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5696, MT5836, MT5838, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8168, MT8365, MT8395, MT9000, MT9015, MT9023, MT9025, MT9618, MT9649, MT9653, MT9679, MT9687, MT9689, MT9902, MT9932, MT9952, MT9972, MT9982",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645184.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-06T12:11:19.196Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20734",
      datePublished: "2023-06-06T12:11:19.196Z",
      dateReserved: "2022-10-28T02:03:10.767Z",
      dateUpdated: "2025-01-08T14:54:47.136Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-32830
Vulnerability from cvelistv5
Published
2023-10-02 02:05
Modified
2024-09-21 15:18
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:25:37.057Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5527",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5583",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5598",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5599",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5670:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5670",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5680:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5680",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5691",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5695",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5806:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5806",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5813:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5813",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5815:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5815",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5816:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5816",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5833:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5833",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5835:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5835",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5895:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5895",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9010",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9011",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9012",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9016",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9020",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9021",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9022",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9215",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9216",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9221",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9222",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9255",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9256",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9266",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9269",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9285",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9286",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9600",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9602",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9610",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9612",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9613",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9615",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9617",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9629",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9630",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9631",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9632",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9633",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9636",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9638",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9639",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9649",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9650",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9652",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9653",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9660",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9666",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9667",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9669",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9670",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9671",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9675",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9679",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9685",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9686",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9688",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9900:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9900",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9901:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9901",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9931",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9950",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9969:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9969",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9970",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9980",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9981",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "android",
                  vendor: "google",
                  versions: [
                     {
                        status: "affected",
                        version: "10.0",
                     },
                     {
                        status: "affected",
                        version: "11.0",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-32830",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-21T15:15:41.446321Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-21T15:18:25.800Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5527, MT5583, MT5598, MT5599, MT5670, MT5680, MT5691, MT5695, MT5806, MT5813, MT5815, MT5816, MT5833, MT5835, MT5895, MT9010, MT9011, MT9012, MT9016, MT9020, MT9021, MT9022, MT9215, MT9216, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9600, MT9602, MT9610, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9633, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9660, MT9666, MT9667, MT9669, MT9670, MT9671, MT9675, MT9679, MT9685, MT9686, MT9688, MT9900, MT9901, MT9931, MT9950, MT9969, MT9970, MT9980, MT9981",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-10-02T02:05:44.060Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-32830",
      datePublished: "2023-10-02T02:05:44.060Z",
      dateReserved: "2023-05-16T03:04:32.150Z",
      dateUpdated: "2024-09-21T15:18:25.800Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20735
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-08 14:30
Summary
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645178.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.135Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20735",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-08T14:30:12.208213Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-08T14:30:18.073Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5696, MT5836, MT5838, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8168, MT8175, MT8195, MT8365, MT8395, MT8673, MT8781, MT8786, MT8789, MT8791T, MT8797, MT9000, MT9015, MT9023, MT9025, MT9618, MT9649, MT9653, MT9679, MT9687, MT9689, MT9902, MT9932, MT9952, MT9972, MT9982",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645178.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-06T12:11:21.208Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20735",
      datePublished: "2023-06-06T12:11:21.208Z",
      dateReserved: "2022-10-28T02:03:10.767Z",
      dateUpdated: "2025-01-08T14:30:18.073Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20747
Vulnerability from cvelistv5
Published
2023-06-06 12:11
Modified
2025-01-07 19:14
Summary
In vcu, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519121.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.966Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 4.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20747",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-07T19:14:39.796298Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-843",
                        description: "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-07T19:14:44.403Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5696, MT5836, MT5838, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8185, MT8195, MT8365, MT8781, MT8786, MT8789, MT8791, MT8797, MT9000, MT9015, MT9023, MT9025, MT9618, MT9649, MT9653, MT9679, MT9687, MT9689, MT9902, MT9932, MT9952, MT9972, MT9982",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In vcu, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519121.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-06T12:11:45.197Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20747",
      datePublished: "2023-06-06T12:11:45.197Z",
      dateReserved: "2022-10-28T02:03:10.770Z",
      dateUpdated: "2025-01-07T19:14:44.403Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20808
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-15 19:49
Severity ?
Summary
In OPTEE, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03645895; Issue ID: DTV03645895.
Impacted products
Vendor Product Version
MediaTek, Inc. MT9011, MT9022, MT9618, MT9649, MT9653 Version: Android 11.0
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.137Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9011",
                  vendor: "mediatek",
                  versions: [
                     {
                        status: "affected",
                        version: "Android 11.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9022",
                  vendor: "mediatek",
                  versions: [
                     {
                        status: "affected",
                        version: "Android 11.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9618",
                  vendor: "mediatek",
                  versions: [
                     {
                        status: "affected",
                        version: "Android 11.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9649",
                  vendor: "mediatek",
                  versions: [
                     {
                        status: "affected",
                        version: "Android 11.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9653",
                  vendor: "mediatek",
                  versions: [
                     {
                        status: "affected",
                        version: "Android 11.0",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20808",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-15T19:47:25.231347Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-15T19:49:27.901Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT9011, MT9022, MT9618, MT9649, MT9653",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In OPTEE, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03645895; Issue ID: DTV03645895.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-07T03:21:54.842Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20808",
      datePublished: "2023-08-07T03:21:54.842Z",
      dateReserved: "2022-10-28T02:03:23.672Z",
      dateUpdated: "2024-10-15T19:49:27.901Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-20001
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2024-08-01 21:52
Severity ?
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961601; Issue ID: DTV03961601.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T21:52:31.394Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5583, MT5586, MT5691, MT5695, MT5696, MT9010, MT9011, MT9012, MT9015, MT9016, MT9020, MT9021, MT9022, MT9025, MT9026, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9286, MT9288, MT9602, MT9603, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9618, MT9629, MT9630, MT9631, MT9632, MT9633, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9660, MT9666, MT9667, MT9669, MT9671, MT9675, MT9679, MT9685, MT9686, MT9688, MT9689",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0, 14.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961601; Issue ID: DTV03961601.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-05T05:59:41.091Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2024-20001",
      datePublished: "2024-02-05T05:59:41.091Z",
      dateReserved: "2023-11-02T13:35:35.146Z",
      dateUpdated: "2024-08-01T21:52:31.394Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "513F8951-3099-444A-9755-C3A75720EFD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "518D4593-D5E2-489C-92C3-343716A621E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C394724-3294-4953-85C8-EE3894B5092C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A56009-090B-4101-B000-224412058654",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "70D16AAC-938F-4BE8-B7BB-067249A6C197",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D16B86F-32D2-4CA3-B18D-B19F63F14D5C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB388AFB-1185-4CF1-8023-C26E366F89DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B028E80F-396F-4898-841D-9E99DE54FAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD7AC916-FF8D-430D-837C-0587056198AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5F738-459C-4316-80AF-1B9C33E0F36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.",
      },
   ],
   id: "CVE-2023-20810",
   lastModified: "2024-11-21T07:41:34.623",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-07T04:15:14.307",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "513F8951-3099-444A-9755-C3A75720EFD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "518D4593-D5E2-489C-92C3-343716A621E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C394724-3294-4953-85C8-EE3894B5092C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A56009-090B-4101-B000-224412058654",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "70D16AAC-938F-4BE8-B7BB-067249A6C197",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D16B86F-32D2-4CA3-B18D-B19F63F14D5C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB388AFB-1185-4CF1-8023-C26E366F89DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B028E80F-396F-4898-841D-9E99DE54FAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD7AC916-FF8D-430D-837C-0587056198AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5F738-459C-4316-80AF-1B9C33E0F36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.",
      },
   ],
   id: "CVE-2023-20811",
   lastModified: "2024-11-21T07:41:34.753",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-07T04:15:14.367",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-10-02 03:15
Modified
2024-11-21 08:04
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C04171-DB18-40D7-AFC5-04A869942396",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C394724-3294-4953-85C8-EE3894B5092C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "455B256C-83C8-406F-B28F-A4205E7C094E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4FF926A-2D26-4666-ACA4-474A89243566",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C59206E9-31C7-40A4-86EF-1D12EA2C5CDC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5680:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07AEB6AF-2644-4560-9C11-C608C1AD9F66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A56009-090B-4101-B000-224412058654",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5806:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2587EAA-29E0-4123-9855-CA726B8014C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5813:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F87A1085-222A-4135-9DB5-EB1AB0452561",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5815:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B4D227C-8387-441E-B085-E933FFB69AE8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5816:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B68EA99F-5323-4167-9DF9-D677BCA37A22",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9237902-24AE-4127-AC96-5982BD37ECC1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63B93DFF-3D39-42DD-B6EB-3E3172F25A93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37B2216B-3B20-4DFC-BB2A-7DDD060E5C40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "726E51E6-E765-4973-A0D2-5CC746CACFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CF26725-1701-40F4-83E9-1A4709B60763",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB80E351-B6E5-4571-A603-04A3A6AFB8CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD7AC916-FF8D-430D-837C-0587056198AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5F738-459C-4316-80AF-1B9C33E0F36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717AE700-78CC-4750-92CB-C9293571EC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4A720E3-FF7F-4607-998D-EBD23F38A2DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9901:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F433EC9-C9F5-40D4-9EBB-219295EC1978",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9969:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B14AF01-D1D9-483B-9D10-2697A08FFA8F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "961C13C3-2C3D-46B1-A618-D45920EC5E95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62282860-5EAF-45EA-B36E-6B6F124C3096",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522.",
      },
      {
         lang: "es",
         value: "En TVAPI, existe una posible escritura fuera de límites debido a una verificación de límites faltantes. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: DTV03802522; ID del problema: DTV03802522.",
      },
   ],
   id: "CVE-2023-32830",
   lastModified: "2024-11-21T08:04:08.193",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-10-02T03:15:10.233",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2024-11-21 08:51
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961601; Issue ID: DTV03961601.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C394724-3294-4953-85C8-EE3894B5092C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E684A498-10F3-4BD8-9935-9ED5933F9157",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A56009-090B-4101-B000-224412058654",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "354492FD-4052-41F8-805E-55F387AF8F17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6133E43-E032-4334-88C7-116B27B3090D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49437377-6D2F-40FD-8CCF-29179C19D296",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B028E80F-396F-4898-841D-9E99DE54FAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26696662-6232-458A-A1E1-067CBDB62FA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CF26725-1701-40F4-83E9-1A4709B60763",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB80E351-B6E5-4571-A603-04A3A6AFB8CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD7AC916-FF8D-430D-837C-0587056198AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5F738-459C-4316-80AF-1B9C33E0F36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717AE700-78CC-4750-92CB-C9293571EC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961601; Issue ID: DTV03961601.",
      },
      {
         lang: "es",
         value: "En TVAPI, existe una posible escritura fuera de los límites debido a una verificación de los límites faltantes. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: DTV03961601; ID del problema: DTV03961601.",
      },
   ],
   id: "CVE-2024-20001",
   lastModified: "2024-11-21T08:51:45.983",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-05T06:15:47.027",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2024-11-21 08:51
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961715; Issue ID: DTV03961715.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C394724-3294-4953-85C8-EE3894B5092C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E684A498-10F3-4BD8-9935-9ED5933F9157",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A56009-090B-4101-B000-224412058654",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "354492FD-4052-41F8-805E-55F387AF8F17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6133E43-E032-4334-88C7-116B27B3090D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49437377-6D2F-40FD-8CCF-29179C19D296",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B028E80F-396F-4898-841D-9E99DE54FAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26696662-6232-458A-A1E1-067CBDB62FA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CF26725-1701-40F4-83E9-1A4709B60763",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB80E351-B6E5-4571-A603-04A3A6AFB8CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD7AC916-FF8D-430D-837C-0587056198AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5F738-459C-4316-80AF-1B9C33E0F36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717AE700-78CC-4750-92CB-C9293571EC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961715; Issue ID: DTV03961715.",
      },
      {
         lang: "es",
         value: "En TVAPI, existe una posible escritura fuera de los límites debido a una verificación de los límites faltantes. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: DTV03961715; ID del problema: DTV03961715.",
      },
   ],
   id: "CVE-2024-20002",
   lastModified: "2024-11-21T08:51:46.143",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-05T06:15:47.083",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-08 15:15
Summary
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645184.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linuxfoundation:iot-yocto:22.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B20DD930-83A1-4715-AD51-458ECA2578D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "437D8F9D-67DF-47A5-9C96-5B51D1562951",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5836:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "222E4ECD-459A-4422-947F-FF26E026BC56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5838:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E72667B1-71C3-4DB5-A5E4-BC8212B1B00B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0200228-E2A8-4DBE-A4DA-7AC7D4B9DE99",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "354492FD-4052-41F8-805E-55F387AF8F17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9023:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "591A2A8B-DB5D-42BC-99A6-0D0DAB45C645",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6133E43-E032-4334-88C7-116B27B3090D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717AE700-78CC-4750-92CB-C9293571EC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9687:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BC2011E-7629-477E-A898-9748119F7A23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9902:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A42C58EE-7A5A-42BE-9C64-1A0F3657AA05",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9932:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB40D8E-E934-47B1-A3A9-102F39C2FF21",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9952:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0407203F-F9DE-4899-B0E6-226A7E9952CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9972:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C76B993-B660-41EB-A66A-96011A044BF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9982:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F8F0452-97F5-4BC6-AC85-42A24721F7CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645184.",
      },
   ],
   id: "CVE-2023-20734",
   lastModified: "2025-01-08T15:15:11.760",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-06-06T13:15:12.800",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-08 15:15
Summary
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645178.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linuxfoundation:iot-yocto:22.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B20DD930-83A1-4715-AD51-458ECA2578D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "437D8F9D-67DF-47A5-9C96-5B51D1562951",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5836:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "222E4ECD-459A-4422-947F-FF26E026BC56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5838:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E72667B1-71C3-4DB5-A5E4-BC8212B1B00B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0200228-E2A8-4DBE-A4DA-7AC7D4B9DE99",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "354492FD-4052-41F8-805E-55F387AF8F17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9023:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "591A2A8B-DB5D-42BC-99A6-0D0DAB45C645",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6133E43-E032-4334-88C7-116B27B3090D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717AE700-78CC-4750-92CB-C9293571EC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9687:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BC2011E-7629-477E-A898-9748119F7A23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9902:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A42C58EE-7A5A-42BE-9C64-1A0F3657AA05",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9932:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB40D8E-E934-47B1-A3A9-102F39C2FF21",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9952:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0407203F-F9DE-4899-B0E6-226A7E9952CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9972:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C76B993-B660-41EB-A66A-96011A044BF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9982:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F8F0452-97F5-4BC6-AC85-42A24721F7CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645178.",
      },
   ],
   id: "CVE-2023-20735",
   lastModified: "2025-01-08T15:15:11.980",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-06-06T13:15:12.910",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In OPTEE, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03645895; Issue ID: DTV03645895.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In OPTEE, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03645895; Issue ID: DTV03645895.",
      },
   ],
   id: "CVE-2023-20808",
   lastModified: "2024-11-21T07:41:34.223",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-07T04:15:14.180",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 20:15
Summary
In vcu, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519121.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linuxfoundation:iot-yocto:22.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B20DD930-83A1-4715-AD51-458ECA2578D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "437D8F9D-67DF-47A5-9C96-5B51D1562951",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5836:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "222E4ECD-459A-4422-947F-FF26E026BC56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5838:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E72667B1-71C3-4DB5-A5E4-BC8212B1B00B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0200228-E2A8-4DBE-A4DA-7AC7D4B9DE99",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "354492FD-4052-41F8-805E-55F387AF8F17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9023:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "591A2A8B-DB5D-42BC-99A6-0D0DAB45C645",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6133E43-E032-4334-88C7-116B27B3090D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717AE700-78CC-4750-92CB-C9293571EC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9687:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BC2011E-7629-477E-A898-9748119F7A23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9902:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A42C58EE-7A5A-42BE-9C64-1A0F3657AA05",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9932:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB40D8E-E934-47B1-A3A9-102F39C2FF21",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9952:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0407203F-F9DE-4899-B0E6-226A7E9952CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9972:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C76B993-B660-41EB-A66A-96011A044BF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9982:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F8F0452-97F5-4BC6-AC85-42A24721F7CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In vcu, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519121.",
      },
   ],
   id: "CVE-2023-20747",
   lastModified: "2025-01-07T20:15:28.907",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-06-06T13:15:14.887",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-06 13:15
Modified
2025-01-07 22:15
Summary
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645173.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linuxfoundation:iot-yocto:22.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B20DD930-83A1-4715-AD51-458ECA2578D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "437D8F9D-67DF-47A5-9C96-5B51D1562951",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5836:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "222E4ECD-459A-4422-947F-FF26E026BC56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5838:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E72667B1-71C3-4DB5-A5E4-BC8212B1B00B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23991D5-1893-49F4-8A06-D5E66C96C3B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EEE021-6B2A-47A0-AC6B-55525A40D718",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B9B0D82-82C1-4A77-A016-329B99C45F49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533284E5-C3AF-48D3-A287-993099DB2E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0200228-E2A8-4DBE-A4DA-7AC7D4B9DE99",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "354492FD-4052-41F8-805E-55F387AF8F17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9023:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "591A2A8B-DB5D-42BC-99A6-0D0DAB45C645",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6133E43-E032-4334-88C7-116B27B3090D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717AE700-78CC-4750-92CB-C9293571EC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9687:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BC2011E-7629-477E-A898-9748119F7A23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9902:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A42C58EE-7A5A-42BE-9C64-1A0F3657AA05",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9932:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB40D8E-E934-47B1-A3A9-102F39C2FF21",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9952:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0407203F-F9DE-4899-B0E6-226A7E9952CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9972:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C76B993-B660-41EB-A66A-96011A044BF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9982:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F8F0452-97F5-4BC6-AC85-42A24721F7CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645173.",
      },
   ],
   id: "CVE-2023-20738",
   lastModified: "2025-01-07T22:15:28.617",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-06-06T13:15:13.430",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/June-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}