CVE-2026-20435 (GCVE-0-2026-20435)
Vulnerability from cvelistv5 – Published: 2026-03-02 08:39 – Updated: 2026-03-30 13:05
VLAI?
Summary
In preloader, there is a possible read of device unique identifiers due to a logic error. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS10607099; Issue ID: MSV-6118.
Severity ?
4.6 (Medium)
CWE
- CWE-522 - Insufficiently Protected Credentials
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MediaTek, Inc. | MediaTek chipset |
Affected:
MT2737
Affected: MT6739 Affected: MT6761 Affected: MT6765 Affected: MT6768 Affected: MT6781 Affected: MT6789 Affected: MT6813 Affected: MT6833 Affected: MT6853 Affected: MT6855 Affected: MT6877 Affected: MT6878 Affected: MT6879 Affected: MT6880 Affected: MT6885 Affected: MT6886 Affected: MT6890 Affected: MT6893 Affected: MT6895 Affected: MT6897 Affected: MT6983 Affected: MT6985 Affected: MT6989 Affected: MT6990 Affected: MT6993 Affected: MT8169 Affected: MT8186 Affected: MT8188 Affected: MT8370 Affected: MT8390 Affected: MT8676 Affected: MT8678 Affected: MT8696 Affected: MT8793 |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-20435",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-02T13:35:00.235194Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-02T13:35:04.764Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MediaTek chipset",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "MT2737"
},
{
"status": "affected",
"version": "MT6739"
},
{
"status": "affected",
"version": "MT6761"
},
{
"status": "affected",
"version": "MT6765"
},
{
"status": "affected",
"version": "MT6768"
},
{
"status": "affected",
"version": "MT6781"
},
{
"status": "affected",
"version": "MT6789"
},
{
"status": "affected",
"version": "MT6813"
},
{
"status": "affected",
"version": "MT6833"
},
{
"status": "affected",
"version": "MT6853"
},
{
"status": "affected",
"version": "MT6855"
},
{
"status": "affected",
"version": "MT6877"
},
{
"status": "affected",
"version": "MT6878"
},
{
"status": "affected",
"version": "MT6879"
},
{
"status": "affected",
"version": "MT6880"
},
{
"status": "affected",
"version": "MT6885"
},
{
"status": "affected",
"version": "MT6886"
},
{
"status": "affected",
"version": "MT6890"
},
{
"status": "affected",
"version": "MT6893"
},
{
"status": "affected",
"version": "MT6895"
},
{
"status": "affected",
"version": "MT6897"
},
{
"status": "affected",
"version": "MT6983"
},
{
"status": "affected",
"version": "MT6985"
},
{
"status": "affected",
"version": "MT6989"
},
{
"status": "affected",
"version": "MT6990"
},
{
"status": "affected",
"version": "MT6993"
},
{
"status": "affected",
"version": "MT8169"
},
{
"status": "affected",
"version": "MT8186"
},
{
"status": "affected",
"version": "MT8188"
},
{
"status": "affected",
"version": "MT8370"
},
{
"status": "affected",
"version": "MT8390"
},
{
"status": "affected",
"version": "MT8676"
},
{
"status": "affected",
"version": "MT8678"
},
{
"status": "affected",
"version": "MT8696"
},
{
"status": "affected",
"version": "MT8793"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In preloader, there is a possible read of device unique identifiers due to a logic error. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS10607099; Issue ID: MSV-6118."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-522",
"description": "CWE-522 Insufficiently Protected Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-30T13:05:38.348Z",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2026"
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2026-20435",
"datePublished": "2026-03-02T08:39:12.070Z",
"dateReserved": "2025-11-03T01:30:59.011Z",
"dateUpdated": "2026-03-30T13:05:38.348Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-20435\",\"sourceIdentifier\":\"security@mediatek.com\",\"published\":\"2026-03-02T09:16:16.600\",\"lastModified\":\"2026-03-03T12:52:46.900\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In preloader, there is a possible read of device unique identifiers due to a logic error. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS10607099; Issue ID: MSV-6118.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@mediatek.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-522\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"437D8F9D-67DF-47A5-9C96-5B51D1562951\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1488152-CC93-40DF-8D1F-BF33DC8444FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB397DA1-62B3-48FD-B694-9FDA4DA25EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2700BCC5-634D-4EC6-AB67-5B678D5F951D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8538774C-906D-4B03-A3E7-FA7A55E0DA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"02882AB1-7993-47DD-84A0-8DF4272D85ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0133207-2EED-4625-854F-8DB7770D5BF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openwrt:openwrt:23.05.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"00113669-2850-4F0C-913A-92CA5290746E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zephyrproject:zephyr:3.7.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA9F6FC-E722-428B-BB01-E9082DBF9A32\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C2A1118-B5F7-4EF5-B329-0887B5F3430E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FA8A390-9F52-4CF3-9B45-936CE3E2B828\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F726F486-A86F-4215-AD93-7A07A071844A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CD97E1-8A76-48B4-9780-9698EF5A960F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4EEE021-6B2A-47A0-AC6B-55525A40D718\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B9B0D82-82C1-4A77-A016-329B99C45F49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9814939B-F05E-4870-90C0-7C0F6BAAEB39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"366F1912-756B-443E-9962-224937DD7DFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855A8046-34ED-4891-ACE5-76AB10AC8D53\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704BE5CE-AE08-4432-A8B0-4C8BD62148AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CF4A7A-3136-4C4C-A795-81323896BE11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD64413C-C774-4C4F-9551-89E1AA9469EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3E2B84-DAFE-4E11-B23B-026F719475F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"171D1C08-F055-44C0-913C-AA2B73AF5B72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B5C7F-D965-4312-9CDF-4F06FA77D401\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CA45C9-7BFE-4C93-B2AF-B86501F763AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A7D8055-F4B6-41EE-A078-11D56285AB66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7DE6B2-66D9-4A3E-B15F-D56505559255\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A76806D-A4E3-466A-90CB-E9FFE478E7A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6993:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E92BE0-5E65-4770-8E1A-0E5D07A38164\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8169:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5375050-4568-4919-BFE3-A72E1C7E65A2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8186:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4932D34-06F4-49D7-81FB-772A82E8A5B5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA3D4A45-38EE-4125-AE67-89D1C707F95A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B774B7D7-B7DD-43A0-833F-7E39DF82CA60\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE302F6F-170E-4350-A8F4-65BE0C50CB78\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"152A5F3D-8004-4649-BDB1-E6F0798AF1CB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26573298-76BC-49FE-8D99-CF03ED01B185\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8793:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBD3487-F8CE-406C-8BD7-DD57FF8CD60B\"}]}]}],\"references\":[{\"url\":\"https://corp.mediatek.com/product-security-bulletin/March-2026\",\"source\":\"security@mediatek.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.6, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-20435\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-02T13:35:00.235194Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-02T13:34:55.071Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"MediaTek, Inc.\", \"product\": \"MediaTek chipset\", \"versions\": [{\"status\": \"affected\", \"version\": \"MT2737\"}, {\"status\": \"affected\", \"version\": \"MT6739\"}, {\"status\": \"affected\", \"version\": \"MT6761\"}, {\"status\": \"affected\", \"version\": \"MT6765\"}, {\"status\": \"affected\", \"version\": \"MT6768\"}, {\"status\": \"affected\", \"version\": \"MT6781\"}, {\"status\": \"affected\", \"version\": \"MT6789\"}, {\"status\": \"affected\", \"version\": \"MT6813\"}, {\"status\": \"affected\", \"version\": \"MT6833\"}, {\"status\": \"affected\", \"version\": \"MT6853\"}, {\"status\": \"affected\", \"version\": \"MT6855\"}, {\"status\": \"affected\", \"version\": \"MT6877\"}, {\"status\": \"affected\", \"version\": \"MT6878\"}, {\"status\": \"affected\", \"version\": \"MT6879\"}, {\"status\": \"affected\", \"version\": \"MT6880\"}, {\"status\": \"affected\", \"version\": \"MT6885\"}, {\"status\": \"affected\", \"version\": \"MT6886\"}, {\"status\": \"affected\", \"version\": \"MT6890\"}, {\"status\": \"affected\", \"version\": \"MT6893\"}, {\"status\": \"affected\", \"version\": \"MT6895\"}, {\"status\": \"affected\", \"version\": \"MT6897\"}, {\"status\": \"affected\", \"version\": \"MT6983\"}, {\"status\": \"affected\", \"version\": \"MT6985\"}, {\"status\": \"affected\", \"version\": \"MT6989\"}, {\"status\": \"affected\", \"version\": \"MT6990\"}, {\"status\": \"affected\", \"version\": \"MT6993\"}, {\"status\": \"affected\", \"version\": \"MT8169\"}, {\"status\": \"affected\", \"version\": \"MT8186\"}, {\"status\": \"affected\", \"version\": \"MT8188\"}, {\"status\": \"affected\", \"version\": \"MT8370\"}, {\"status\": \"affected\", \"version\": \"MT8390\"}, {\"status\": \"affected\", \"version\": \"MT8676\"}, {\"status\": \"affected\", \"version\": \"MT8678\"}, {\"status\": \"affected\", \"version\": \"MT8696\"}, {\"status\": \"affected\", \"version\": \"MT8793\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://corp.mediatek.com/product-security-bulletin/March-2026\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In preloader, there is a possible read of device unique identifiers due to a logic error. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS10607099; Issue ID: MSV-6118.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-522\", \"description\": \"CWE-522 Insufficiently Protected Credentials\"}]}], \"providerMetadata\": {\"orgId\": \"ee979b05-11f8-4f25-a7e0-a1fa9c190374\", \"shortName\": \"MediaTek\", \"dateUpdated\": \"2026-03-30T13:05:38.348Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-20435\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-30T13:05:38.348Z\", \"dateReserved\": \"2025-11-03T01:30:59.011Z\", \"assignerOrgId\": \"ee979b05-11f8-4f25-a7e0-a1fa9c190374\", \"datePublished\": \"2026-03-02T08:39:12.070Z\", \"assignerShortName\": \"MediaTek\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…