var-202207-0322
Vulnerability from variot
In WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704393. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. MediaTek Inc. is the world's fourth largest fab semiconductor company, with a leading position in mobile terminals, smart home applications, wireless connectivity technologies and IoT products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available worldwide.
Several MediaTek chip WLAN drivers have an input validation error vulnerability. An attacker could exploit the vulnerability to escalate local privileges without requiring user interaction
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0322", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "android", "scope": "eq", "trust": 1.8, "vendor": "google", "version": "11.0" }, { "model": "android", "scope": "eq", "trust": 1.8, "vendor": "google", "version": "12.0" }, { "model": "android", "scope": "eq", "trust": 0.8, "vendor": "google", "version": null }, { "model": "android", "scope": null, "trust": 0.8, "vendor": "google", "version": null }, { "model": "mt8168 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8168 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8365 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8365 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8696 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8696 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6761 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6761 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6779 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6779 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6781 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6781 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6833 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6833 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6873 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6873 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6877 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6877 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6883 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6883 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6885 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6885 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6889 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6889 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6983 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6983 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8667 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8667 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8675 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8675 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8766 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8766 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8768 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8768 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8786 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8786 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8788 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8788 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8789 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8789 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8797 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8797 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6853 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6853 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6879 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6879 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6893 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6893 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6895 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt6895 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8167s android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8167s android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8183 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8183 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8185 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8185 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8362a android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8362a android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8385 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8385 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8791 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8791 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8175 android11.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null }, { "model": "mt8175 android12.0", "scope": null, "trust": 0.6, "vendor": "mediatek", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-66249" }, { "db": "JVNDB", "id": "JVNDB-2022-012848" }, { "db": "NVD", "id": "CVE-2022-21779" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-21779" } ] }, "cve": "CVE-2022-21779", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-21779", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2022-66249", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-21779", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-21779", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2022-66249", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-466", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-21779", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-66249" }, { "db": "VULMON", "id": "CVE-2022-21779" }, { "db": "JVNDB", "id": "JVNDB-2022-012848" }, { "db": "NVD", "id": "CVE-2022-21779" }, { "db": "CNNVD", "id": "CNNVD-202207-466" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704393. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. MediaTek Inc. is the world\u0027s fourth largest fab semiconductor company, with a leading position in mobile terminals, smart home applications, wireless connectivity technologies and IoT products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available worldwide. \n\r\n\r\nSeveral MediaTek chip WLAN drivers have an input validation error vulnerability. An attacker could exploit the vulnerability to escalate local privileges without requiring user interaction", "sources": [ { "db": "NVD", "id": "CVE-2022-21779" }, { "db": "JVNDB", "id": "JVNDB-2022-012848" }, { "db": "CNVD", "id": "CNVD-2022-66249" }, { "db": "VULMON", "id": "CVE-2022-21779" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-21779", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-012848", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-66249", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022070819", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-466", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-21779", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-66249" }, { "db": "VULMON", "id": "CVE-2022-21779" }, { "db": "JVNDB", "id": "JVNDB-2022-012848" }, { "db": "NVD", "id": "CVE-2022-21779" }, { "db": "CNNVD", "id": "CNNVD-202207-466" } ] }, "id": "VAR-202207-0322", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-66249" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-66249" } ] }, "last_update_date": "2023-12-18T11:38:41.613000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Multiple MediaTek chip WLAN driver input validation error vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/353606" }, { "title": "Google Android Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199240" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-66249" }, { "db": "CNNVD", "id": "CNNVD-202207-466" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012848" }, { "db": "NVD", "id": "CVE-2022-21779" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://corp.mediatek.com/product-security-bulletin/july-2022" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21779" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022070819" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-21779/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-66249" }, { "db": "VULMON", "id": "CVE-2022-21779" }, { "db": "JVNDB", "id": "JVNDB-2022-012848" }, { "db": "NVD", "id": "CVE-2022-21779" }, { "db": "CNNVD", "id": "CNNVD-202207-466" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-66249" }, { "db": "VULMON", "id": "CVE-2022-21779" }, { "db": "JVNDB", "id": "JVNDB-2022-012848" }, { "db": "NVD", "id": "CVE-2022-21779" }, { "db": "CNNVD", "id": "CNNVD-202207-466" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-29T00:00:00", "db": "CNVD", "id": "CNVD-2022-66249" }, { "date": "2022-07-06T00:00:00", "db": "VULMON", "id": "CVE-2022-21779" }, { "date": "2023-09-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012848" }, { "date": "2022-07-06T14:15:17.837000", "db": "NVD", "id": "CVE-2022-21779" }, { "date": "2022-07-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-466" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-28T00:00:00", "db": "CNVD", "id": "CNVD-2022-66249" }, { "date": "2022-07-13T00:00:00", "db": "VULMON", "id": "CVE-2022-21779" }, { "date": "2023-09-01T08:17:00", "db": "JVNDB", "id": "JVNDB-2022-012848" }, { "date": "2022-07-13T16:18:00.790000", "db": "NVD", "id": "CVE-2022-21779" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-466" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-466" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Google\u00a0 of \u00a0Android\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012848" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-466" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.