cve-2023-32855
Vulnerability from cvelistv5
Published
2023-12-04 03:45
Modified
2024-08-02 15:32
Severity ?
Summary
In aee, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07909204; Issue ID: ALPS07909204.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:32:45.179Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6765, MT6768, MT6769, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6885, MT6889, MT6890, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8667, MT8765, MT8768, MT8786, MT8791, MT8791T, MT8791WIFI, MT8798",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6, 3.3, 4.0 / RDK-B 22Q3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In aee, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07909204; Issue ID: ALPS07909204."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T03:45:53.469Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2023-32855",
    "datePublished": "2023-12-04T03:45:53.469Z",
    "dateReserved": "2023-05-16T03:04:32.158Z",
    "dateUpdated": "2024-08-02T15:32:45.179Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"397C75CA-D217-4617-B8B1-80F74CFB04CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2385F2C9-3EA1-424B-AB8D-A672BF1CBE56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"437D8F9D-67DF-47A5-9C96-5B51D1562951\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1488152-CC93-40DF-8D1F-BF33DC8444FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8FB8EE9-FC56-4D5E-AE55-A5967634740C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"879FFD0C-9B38-4CAA-B057-1086D794D469\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA469E2-9E63-4C9A-8EBA-10C8C870063A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:openwrt:openwrt:21.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D36D1D8-C428-438F-A773-150B30A8EBFC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C2A1118-B5F7-4EF5-B329-0887B5F3430E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06CD97E1-8A76-48B4-9780-9698EF5A960F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D23991D5-1893-49F4-8A06-D5E66C96C3B3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9814939B-F05E-4870-90C0-7C0F6BAAEB39\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19A63103-C708-48EC-B44D-5E465A6B79C5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"366F1912-756B-443E-9962-224937DD7DFB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"328DA6BE-1303-4646-89B7-2EC8DC444532\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"704BE5CE-AE08-4432-A8B0-4C8BD62148AD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68CF4A7A-3136-4C4C-A795-81323896BE11\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD64413C-C774-4C4F-9551-89E1AA9469EE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B787DC3-8E5A-4968-B20B-37B6257FAAE2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"171D1C08-F055-44C0-913C-AA2B73AF5B72\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"213B5C7F-D965-4312-9CDF-4F06FA77D401\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0CA45C9-7BFE-4C93-B2AF-B86501F763AB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA9131F6-F167-4FD7-8FBF-B372CBBCF46F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A76806D-A4E3-466A-90CB-E9FFE478E7A0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FE14B46-C1CA-465F-8578-059FA2ED30EB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AACF35D-27E0-49AF-A667-13585C8B8071\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CD2C3EC-B62D-4616-964F-FDBE5B14A449\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BB05B1D-77C9-4E42-91AD-9F087413DC20\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8791wifi:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"720F4AA0-6AAE-465F-8F50-F11DD11B5FA3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"637CAAD2-DCC0-4F81-B781-5D0536844CA8\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In aee, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07909204; Issue ID: ALPS07909204.\"}, {\"lang\": \"es\", \"value\": \"En aee, existe una posible escalada de privilegios debido a la falta de una verificaci\\u00f3n de permisos. Esto podr\\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\\u00f3n de System necesarios. La interacci\\u00f3n del usuario no es necesaria para la explotaci\\u00f3n. ID de parche: ALPS07909204; ID del problema: ALPS07909204.\"}]",
      "id": "CVE-2023-32855",
      "lastModified": "2024-11-21T08:04:11.670",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}]}",
      "published": "2023-12-04T04:15:08.043",
      "references": "[{\"url\": \"https://corp.mediatek.com/product-security-bulletin/December-2023\", \"source\": \"security@mediatek.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://corp.mediatek.com/product-security-bulletin/December-2023\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@mediatek.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-862\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-32855\",\"sourceIdentifier\":\"security@mediatek.com\",\"published\":\"2023-12-04T04:15:08.043\",\"lastModified\":\"2024-11-21T08:04:11.670\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In aee, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07909204; Issue ID: ALPS07909204.\"},{\"lang\":\"es\",\"value\":\"En aee, existe una posible escalada de privilegios debido a la falta de una verificaci\u00f3n de permisos. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS07909204; ID del problema: ALPS07909204.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"397C75CA-D217-4617-B8B1-80F74CFB04CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2385F2C9-3EA1-424B-AB8D-A672BF1CBE56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"437D8F9D-67DF-47A5-9C96-5B51D1562951\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1488152-CC93-40DF-8D1F-BF33DC8444FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8FB8EE9-FC56-4D5E-AE55-A5967634740C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"879FFD0C-9B38-4CAA-B057-1086D794D469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA469E2-9E63-4C9A-8EBA-10C8C870063A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openwrt:openwrt:21.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D36D1D8-C428-438F-A773-150B30A8EBFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C2A1118-B5F7-4EF5-B329-0887B5F3430E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CD97E1-8A76-48B4-9780-9698EF5A960F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D23991D5-1893-49F4-8A06-D5E66C96C3B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9814939B-F05E-4870-90C0-7C0F6BAAEB39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A63103-C708-48EC-B44D-5E465A6B79C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"366F1912-756B-443E-9962-224937DD7DFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"328DA6BE-1303-4646-89B7-2EC8DC444532\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704BE5CE-AE08-4432-A8B0-4C8BD62148AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CF4A7A-3136-4C4C-A795-81323896BE11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD64413C-C774-4C4F-9551-89E1AA9469EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B787DC3-8E5A-4968-B20B-37B6257FAAE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"171D1C08-F055-44C0-913C-AA2B73AF5B72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B5C7F-D965-4312-9CDF-4F06FA77D401\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CA45C9-7BFE-4C93-B2AF-B86501F763AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA9131F6-F167-4FD7-8FBF-B372CBBCF46F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A76806D-A4E3-466A-90CB-E9FFE478E7A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE14B46-C1CA-465F-8578-059FA2ED30EB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AACF35D-27E0-49AF-A667-13585C8B8071\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CD2C3EC-B62D-4616-964F-FDBE5B14A449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BB05B1D-77C9-4E42-91AD-9F087413DC20\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8791wifi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"720F4AA0-6AAE-465F-8F50-F11DD11B5FA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"637CAAD2-DCC0-4F81-B781-5D0536844CA8\"}]}]}],\"references\":[{\"url\":\"https://corp.mediatek.com/product-security-bulletin/December-2023\",\"source\":\"security@mediatek.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://corp.mediatek.com/product-security-bulletin/December-2023\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.