VAR-202207-0263
Vulnerability from variot - Updated: 2023-12-18 11:29In CCCI, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641673; Issue ID: ALPS06641687. MediaTek Inc. is the world's fourth-largest foundry semiconductor company. It is in a leading position in the markets of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available all over the world.
Several MediaTek chips CCCIs have an input validation error vulnerability. The vulnerability stems from the lack of bounds checking in CCCI
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202207-0263",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "android",
"scope": "eq",
"trust": 1.0,
"vendor": "google",
"version": "10.0"
},
{
"model": "android",
"scope": "eq",
"trust": 1.0,
"vendor": "google",
"version": "11.0"
},
{
"model": "android",
"scope": "eq",
"trust": 1.0,
"vendor": "google",
"version": "12.0"
},
{
"model": "mt6580 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6580 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6737 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6737 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6739 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6739 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6761 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6761 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6765 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6765 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6768 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6768 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6779 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6779 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6781 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6781 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6785 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6785 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6833 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6833 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6873 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6873 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6877 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6877 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6883 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6883 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6885 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6885 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6889 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6889 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6983 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6983 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8321 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8321 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8667 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8667 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8675 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8675 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8765 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8765 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8766 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8766 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8768 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8768 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8786 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8786 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8788 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8788 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8789 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8789 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8797 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8797 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6853 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6853 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6879 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6879 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6893 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6893 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6895 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6895 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6735 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6735 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6771 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6771 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8791 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8791 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6753 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt6753 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8666 android11.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
},
{
"model": "mt8666 android12.0",
"scope": null,
"trust": 0.6,
"vendor": "mediatek",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-88289"
},
{
"db": "NVD",
"id": "CVE-2022-21769"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2022-21769"
}
]
},
"cve": "CVE-2022-21769",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2022-88289",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2022-21769",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "LOW",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2022-21769",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2022-88289",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-202207-471",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2022-21769",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-88289"
},
{
"db": "VULMON",
"id": "CVE-2022-21769"
},
{
"db": "NVD",
"id": "CVE-2022-21769"
},
{
"db": "CNNVD",
"id": "CNNVD-202207-471"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In CCCI, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641673; Issue ID: ALPS06641687. MediaTek Inc. is the world\u0027s fourth-largest foundry semiconductor company. It is in a leading position in the markets of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available all over the world. \n\r\n\r\nSeveral MediaTek chips CCCIs have an input validation error vulnerability. The vulnerability stems from the lack of bounds checking in CCCI",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-21769"
},
{
"db": "CNVD",
"id": "CNVD-2022-88289"
},
{
"db": "VULMON",
"id": "CVE-2022-21769"
}
],
"trust": 1.53
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-21769",
"trust": 2.3
},
{
"db": "CNVD",
"id": "CNVD-2022-88289",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2022070819",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202207-471",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2022-21769",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-88289"
},
{
"db": "VULMON",
"id": "CVE-2022-21769"
},
{
"db": "NVD",
"id": "CVE-2022-21769"
},
{
"db": "CNNVD",
"id": "CNNVD-202207-471"
}
]
},
"id": "VAR-202207-0263",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-88289"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-88289"
}
]
},
"last_update_date": "2023-12-18T11:29:30.909000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Multiple MediaTek chips CCCI input validation error vulnerability (CNVD-2022-88289)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/354061"
},
{
"title": "Google Android Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199245"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-88289"
},
{
"db": "CNNVD",
"id": "CNNVD-202207-471"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-125",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2022-21769"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "https://corp.mediatek.com/product-security-bulletin/july-2022"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-21769/"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2022070819"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/125.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-88289"
},
{
"db": "VULMON",
"id": "CVE-2022-21769"
},
{
"db": "NVD",
"id": "CVE-2022-21769"
},
{
"db": "CNNVD",
"id": "CNNVD-202207-471"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2022-88289"
},
{
"db": "VULMON",
"id": "CVE-2022-21769"
},
{
"db": "NVD",
"id": "CVE-2022-21769"
},
{
"db": "CNNVD",
"id": "CNNVD-202207-471"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-09-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-88289"
},
{
"date": "2022-07-06T00:00:00",
"db": "VULMON",
"id": "CVE-2022-21769"
},
{
"date": "2022-07-06T14:15:17.383000",
"db": "NVD",
"id": "CVE-2022-21769"
},
{
"date": "2022-07-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202207-471"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-12-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-88289"
},
{
"date": "2022-07-14T00:00:00",
"db": "VULMON",
"id": "CVE-2022-21769"
},
{
"date": "2022-07-14T10:17:11.280000",
"db": "NVD",
"id": "CVE-2022-21769"
},
{
"date": "2022-07-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202207-471"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202207-471"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple MediaTek chips CCCI input validation error vulnerability (CNVD-2022-88289)",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-88289"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202207-471"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.