cve-2022-32648
Vulnerability from cvelistv5
Published
2023-01-03 00:00
Modified
2024-08-03 07:46
Severity ?
EPSS score ?
Summary
In disp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06535964; Issue ID: ALPS06535964.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | MediaTek, Inc. | MT6735, MT6737, MT6739, MT6753, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6789 |
Version: Android 11.0, 12.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:46:44.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://corp.mediatek.com/product-security-bulletin/January-2023" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MT6735, MT6737, MT6739, MT6753, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6789", "vendor": "MediaTek, Inc.", "versions": [ { "status": "affected", "version": "Android 11.0, 12.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In disp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06535964; Issue ID: ALPS06535964." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-03T00:00:00", "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "shortName": "MediaTek" }, "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/January-2023" } ] } }, "cveMetadata": { "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "assignerShortName": "MediaTek", "cveId": "CVE-2022-32648", "datePublished": "2023-01-03T00:00:00", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T07:46:44.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"109DD7FD-3A48-4C3D-8E1A-4433B98E1E64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8FB8EE9-FC56-4D5E-AE55-A5967634740C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C82E144B-0BAD-47E1-A657-3A5880988FE2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E76B29F-007E-4445-B3F3-3FDC054FEB84\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FA8A390-9F52-4CF3-9B45-936CE3E2B828\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7362AED0-47F2-4D48-A292-89F717F0697E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4C27948-65A7-4B1E-9F10-6744D176A5C3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F726F486-A86F-4215-AD93-7A07A071844A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F19C76A-50DF-4ACA-BACA-07157B4D838B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06CD97E1-8A76-48B4-9780-9698EF5A960F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE4D2AED-C713-407F-A34A-52C3D8F65835\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBA369B8-8E23-492B-82CC-23114E6A5D1C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A82E0A4F-072F-474C-B94C-8114ABE05639\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B9B0D82-82C1-4A77-A016-329B99C45F49\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"In disp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06535964; Issue ID: ALPS06535964.\"}, {\"lang\": \"es\", \"value\": \"En disp, existe un posible use after free debido a una condici\\u00f3n de ejecuci\\u00f3n. Esto podr\\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\\u00f3n del sistema necesarios. La interacci\\u00f3n del usuario no es necesaria para la explotaci\\u00f3n. ID de parche: ALPS06535964; ID del problema: ALPS06535964.\"}]", "id": "CVE-2022-32648", "lastModified": "2024-11-21T07:06:48.543", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.5, \"impactScore\": 5.9}]}", "published": "2023-01-03T21:15:12.073", "references": "[{\"url\": \"https://corp.mediatek.com/product-security-bulletin/January-2023\", \"source\": \"security@mediatek.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://corp.mediatek.com/product-security-bulletin/January-2023\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "security@mediatek.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-662\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2022-32648\",\"sourceIdentifier\":\"security@mediatek.com\",\"published\":\"2023-01-03T21:15:12.073\",\"lastModified\":\"2024-11-21T07:06:48.543\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In disp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06535964; Issue ID: ALPS06535964.\"},{\"lang\":\"es\",\"value\":\"En disp, existe un posible use after free debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\u00f3n del sistema necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS06535964; ID del problema: ALPS06535964.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-662\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109DD7FD-3A48-4C3D-8E1A-4433B98E1E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8FB8EE9-FC56-4D5E-AE55-A5967634740C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C82E144B-0BAD-47E1-A657-3A5880988FE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E76B29F-007E-4445-B3F3-3FDC054FEB84\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FA8A390-9F52-4CF3-9B45-936CE3E2B828\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7362AED0-47F2-4D48-A292-89F717F0697E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C27948-65A7-4B1E-9F10-6744D176A5C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F726F486-A86F-4215-AD93-7A07A071844A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F19C76A-50DF-4ACA-BACA-07157B4D838B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CD97E1-8A76-48B4-9780-9698EF5A960F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE4D2AED-C713-407F-A34A-52C3D8F65835\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA369B8-8E23-492B-82CC-23114E6A5D1C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82E0A4F-072F-474C-B94C-8114ABE05639\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B9B0D82-82C1-4A77-A016-329B99C45F49\"}]}]}],\"references\":[{\"url\":\"https://corp.mediatek.com/product-security-bulletin/January-2023\",\"source\":\"security@mediatek.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://corp.mediatek.com/product-security-bulletin/January-2023\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.