cve-2022-20083
Vulnerability from cvelistv5
Published
2022-07-06 13:05
Modified
2024-08-03 02:02
Severity ?
EPSS score ?
Summary
In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:02:30.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://corp.mediatek.com/product-security-bulletin/July-2022" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MT2731, MT2735, MT6297, MT6725, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6755, MT6757, MT6757P, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6797, MT6799, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797", "vendor": "MediaTek, Inc.", "versions": [ { "status": "affected", "version": "Modem LR9, \nLR11, \nLR12, \nLR12A, \nLR13, \nNR15,\nNR16" } ] } ], "descriptions": [ { "lang": "en", "value": "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-06T13:05:39", "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "shortName": "MediaTek" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://corp.mediatek.com/product-security-bulletin/July-2022" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mediatek.com", "ID": "CVE-2022-20083", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MT2731, MT2735, MT6297, MT6725, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6755, MT6757, MT6757P, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6797, MT6799, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT8666, MT8667, MT8675, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797", "version": { "version_data": [ { "version_value": "Modem LR9, \nLR11, \nLR12, \nLR12A, \nLR13, \nNR15,\nNR16" } ] } } ] }, "vendor_name": "MediaTek, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://corp.mediatek.com/product-security-bulletin/July-2022", "refsource": "MISC", "url": "https://corp.mediatek.com/product-security-bulletin/July-2022" } ] } } } }, "cveMetadata": { "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "assignerShortName": "MediaTek", "cveId": "CVE-2022-20083", "datePublished": "2022-07-06T13:05:39", "dateReserved": "2021-10-12T00:00:00", "dateUpdated": "2024-08-03T02:02:30.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFEBC79B-E936-4499-8B2D-C6619C51B755\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32EA5EB6-EBC1-4660-9E03-616CDB25C417\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12318A0A-16CD-48A5-98A4-373070734642\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mediatek:lr9:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"387D7FC2-2146-4565-9B9B-D84EF686DBA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E30A2D2E-6A72-4070-A471-EEE75F7D07F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B763B71-F913-45B4-B91E-D7F0670C4315\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6528FA05-C8B7-498B-93BE-0BEFED28C1FB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99B87E31-AC92-445B-94B8-33DBF72EC11C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6725:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCEE78CC-80F8-4C4F-92BA-378AAA85F087\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C82E144B-0BAD-47E1-A657-3A5880988FE2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E76B29F-007E-4445-B3F3-3FDC054FEB84\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FA8A390-9F52-4CF3-9B45-936CE3E2B828\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F51C9D91-A64F-446E-BC14-7C79B770C3A0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A1CB8F-3C1C-4374-8D46-23175D1174DE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47BE9434-12D6-4801-8B04-7F18AF58E717\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4C27948-65A7-4B1E-9F10-6744D176A5C3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6757p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"424A75C9-2A15-4B00-B0B7-703A4840CC1D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B15C285A-0A26-46F7-9D72-CCADC47D93B0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F726F486-A86F-4215-AD93-7A07A071844A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C445EB80-6021-4E26-B74E-1B4B6910CE48\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0002C537-4268-43CA-B349-BC14F1F0313C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F19C76A-50DF-4ACA-BACA-07157B4D838B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE80B083-D5A3-418C-9655-C79C9DECB4C5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3367BA13-9C4D-4CCF-8E71-397F33CFF773\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06CD97E1-8A76-48B4-9780-9698EF5A960F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D23991D5-1893-49F4-8A06-D5E66C96C3B3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B43D63CF-FF77-41D8-BA4B-F8BDF88830BA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA1BE913-70AE-49FE-99E9-E996165DF79D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE4D2AED-C713-407F-A34A-52C3D8F65835\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C387CFFD-BAE4-4626-8AC3-7C9CFB6819FB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBA369B8-8E23-492B-82CC-23114E6A5D1C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4EEE021-6B2A-47A0-AC6B-55525A40D718\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2C8F9C2-6471-4498-B089-2F40D2483487\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A82E0A4F-072F-474C-B94C-8114ABE05639\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E208C7B7-7BF6-4E56-B61C-0198B08DC8B3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B9B0D82-82C1-4A77-A016-329B99C45F49\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE7CC141-E2D6-4F28-B6F0-167E11869CD1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9814939B-F05E-4870-90C0-7C0F6BAAEB39\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"366F1912-756B-443E-9962-224937DD7DFB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"704BE5CE-AE08-4432-A8B0-4C8BD62148AD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68CF4A7A-3136-4C4C-A795-81323896BE11\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15E2EC3F-9FB3-488B-B1C1-2793A416C755\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD64413C-C774-4C4F-9551-89E1AA9469EE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B787DC3-8E5A-4968-B20B-37B6257FAAE2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"171D1C08-F055-44C0-913C-AA2B73AF5B72\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8E91CA4-CA5B-40D1-9A96-2B875104BCF4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"213B5C7F-D965-4312-9CDF-4F06FA77D401\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0CA45C9-7BFE-4C93-B2AF-B86501F763AB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FE14B46-C1CA-465F-8578-059FA2ED30EB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03E6123A-7603-4EAB-AFFB-229E8A040709\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45A7A805-EFED-47B3-884C-158FF1EECAEC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AACF35D-27E0-49AF-A667-13585C8B8071\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE45F606-2E75-48BC-9D1B-99D504974CBF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D09F23D-D023-4A60-B426-61251FDD8A5A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"533284E5-C3AF-48D3-A287-993099DB2E41\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE10C121-F2AD-43D2-8FF9-A6C197858220\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1505AD53-987E-4328-8E1D-F5F1EC12B677\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CD2C3EC-B62D-4616-964F-FDBE5B14A449\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B469BF4-5961-42E9-814B-1BE06D182E45\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.\"}, {\"lang\": \"es\", \"value\": \"En Modem 2G/3G CC, es posible sea producida una escritura fuera de l\\u00edmites debido a una falta de comprobaci\\u00f3n de l\\u00edmites. Esto podr\\u00eda conllevar a una ejecuci\\u00f3n de c\\u00f3digo remota cuando es descodificada FACILITY combinada sin ser necesarios privilegios de ejecuci\\u00f3n adicionales. No es requerida una interacci\\u00f3n del usuario para su explotaci\\u00f3n. ID del parche: MOLY00803883; ID de Incidencia: MOLY00803883\"}]", "id": "CVE-2022-20083", "lastModified": "2024-11-21T06:42:07.020", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2022-07-06T14:15:16.980", "references": "[{\"url\": \"https://corp.mediatek.com/product-security-bulletin/July-2022\", \"source\": \"security@mediatek.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://corp.mediatek.com/product-security-bulletin/July-2022\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "security@mediatek.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2022-20083\",\"sourceIdentifier\":\"security@mediatek.com\",\"published\":\"2022-07-06T14:15:16.980\",\"lastModified\":\"2024-11-21T06:42:07.020\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.\"},{\"lang\":\"es\",\"value\":\"En Modem 2G/3G CC, es posible sea producida una escritura fuera de l\u00edmites debido a una falta de comprobaci\u00f3n de l\u00edmites. Esto podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo remota cuando es descodificada FACILITY combinada sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: MOLY00803883; ID de Incidencia: MOLY00803883\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFEBC79B-E936-4499-8B2D-C6619C51B755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EA5EB6-EBC1-4660-9E03-616CDB25C417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12318A0A-16CD-48A5-98A4-373070734642\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:lr9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387D7FC2-2146-4565-9B9B-D84EF686DBA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30A2D2E-6A72-4070-A471-EEE75F7D07F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B763B71-F913-45B4-B91E-D7F0670C4315\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6528FA05-C8B7-498B-93BE-0BEFED28C1FB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99B87E31-AC92-445B-94B8-33DBF72EC11C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6725:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCEE78CC-80F8-4C4F-92BA-378AAA85F087\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C82E144B-0BAD-47E1-A657-3A5880988FE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E76B29F-007E-4445-B3F3-3FDC054FEB84\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FA8A390-9F52-4CF3-9B45-936CE3E2B828\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F51C9D91-A64F-446E-BC14-7C79B770C3A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A1CB8F-3C1C-4374-8D46-23175D1174DE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47BE9434-12D6-4801-8B04-7F18AF58E717\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C27948-65A7-4B1E-9F10-6744D176A5C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6757p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"424A75C9-2A15-4B00-B0B7-703A4840CC1D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15C285A-0A26-46F7-9D72-CCADC47D93B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F726F486-A86F-4215-AD93-7A07A071844A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C445EB80-6021-4E26-B74E-1B4B6910CE48\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0002C537-4268-43CA-B349-BC14F1F0313C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F19C76A-50DF-4ACA-BACA-07157B4D838B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE80B083-D5A3-418C-9655-C79C9DECB4C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3367BA13-9C4D-4CCF-8E71-397F33CFF773\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CD97E1-8A76-48B4-9780-9698EF5A960F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D23991D5-1893-49F4-8A06-D5E66C96C3B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B43D63CF-FF77-41D8-BA4B-F8BDF88830BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA1BE913-70AE-49FE-99E9-E996165DF79D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE4D2AED-C713-407F-A34A-52C3D8F65835\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C387CFFD-BAE4-4626-8AC3-7C9CFB6819FB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA369B8-8E23-492B-82CC-23114E6A5D1C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4EEE021-6B2A-47A0-AC6B-55525A40D718\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C8F9C2-6471-4498-B089-2F40D2483487\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82E0A4F-072F-474C-B94C-8114ABE05639\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E208C7B7-7BF6-4E56-B61C-0198B08DC8B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B9B0D82-82C1-4A77-A016-329B99C45F49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE7CC141-E2D6-4F28-B6F0-167E11869CD1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9814939B-F05E-4870-90C0-7C0F6BAAEB39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"366F1912-756B-443E-9962-224937DD7DFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704BE5CE-AE08-4432-A8B0-4C8BD62148AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CF4A7A-3136-4C4C-A795-81323896BE11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15E2EC3F-9FB3-488B-B1C1-2793A416C755\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD64413C-C774-4C4F-9551-89E1AA9469EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B787DC3-8E5A-4968-B20B-37B6257FAAE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"171D1C08-F055-44C0-913C-AA2B73AF5B72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8E91CA4-CA5B-40D1-9A96-2B875104BCF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B5C7F-D965-4312-9CDF-4F06FA77D401\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CA45C9-7BFE-4C93-B2AF-B86501F763AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE14B46-C1CA-465F-8578-059FA2ED30EB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03E6123A-7603-4EAB-AFFB-229E8A040709\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45A7A805-EFED-47B3-884C-158FF1EECAEC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1BB519B-9BA4-4D4A-8ED1-CE79E56E70E4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AACF35D-27E0-49AF-A667-13585C8B8071\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE45F606-2E75-48BC-9D1B-99D504974CBF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D09F23D-D023-4A60-B426-61251FDD8A5A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"533284E5-C3AF-48D3-A287-993099DB2E41\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE10C121-F2AD-43D2-8FF9-A6C197858220\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1505AD53-987E-4328-8E1D-F5F1EC12B677\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CD2C3EC-B62D-4616-964F-FDBE5B14A449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B469BF4-5961-42E9-814B-1BE06D182E45\"}]}]}],\"references\":[{\"url\":\"https://corp.mediatek.com/product-security-bulletin/July-2022\",\"source\":\"security@mediatek.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://corp.mediatek.com/product-security-bulletin/July-2022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.