VAR-202210-0376
Vulnerability from variot - Updated: 2023-12-18 13:36In ril, there is a possible system crash due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07257259; Issue ID: ALPS07257259. Google of Android There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state. MediaTek Inc. is the world's fourth-largest foundry semiconductor company. It is in a leading position in the markets of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available all over the world
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202210-0376",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "android",
"scope": "eq",
"trust": 1.8,
"vendor": "google",
"version": "12.0"
},
{
"model": "android",
"scope": "eq",
"trust": 1.8,
"vendor": "google",
"version": "11.0"
},
{
"model": "android",
"scope": null,
"trust": 0.8,
"vendor": "google",
"version": null
},
{
"model": "android",
"scope": "eq",
"trust": 0.8,
"vendor": "google",
"version": null
},
{
"model": "mt6580 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6580 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6739 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6739 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6753 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6753 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6757 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6757 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6761 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6761 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6762 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6762 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6763 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6763 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6765 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6765 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6768 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6768 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6779 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6779 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6781 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6781 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6785 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6785 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6789 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6789 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6833 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6833 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6853 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6853 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6853t android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6853t android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6855 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6855 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6873 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6873 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6875 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6875 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6877 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6877 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6879 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6879 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6885 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6885 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6893 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6893 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6895 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6895 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt6983 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt6983 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8321 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8321 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8385 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8385 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8666 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8666 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8675 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8675 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8765 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8765 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8766 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8766 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8768 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8768 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8786 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8786 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8788 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8788 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8789 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8789 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8791 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8791 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
},
{
"model": "mt8797 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "11.0"
},
{
"model": "mt8797 android",
"scope": "eq",
"trust": 0.6,
"vendor": "mediatek",
"version": "12.0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-87959"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-018867"
},
{
"db": "NVD",
"id": "CVE-2022-32591"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2022-32591"
}
]
},
"cve": "CVE-2022-32591",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CNVD-2022-87959",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2022-32591",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2022-32591",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2022-87959",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202210-339",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-87959"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-018867"
},
{
"db": "NVD",
"id": "CVE-2022-32591"
},
{
"db": "CNNVD",
"id": "CNNVD-202210-339"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In ril, there is a possible system crash due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07257259; Issue ID: ALPS07257259. Google of Android There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state. MediaTek Inc. is the world\u0027s fourth-largest foundry semiconductor company. It is in a leading position in the markets of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available all over the world",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-32591"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-018867"
},
{
"db": "CNVD",
"id": "CNVD-2022-87959"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-32591",
"trust": 3.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-018867",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2022-87959",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202210-339",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-87959"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-018867"
},
{
"db": "NVD",
"id": "CVE-2022-32591"
},
{
"db": "CNNVD",
"id": "CNNVD-202210-339"
}
]
},
"id": "VAR-202210-0376",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-87959"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-87959"
}
]
},
"last_update_date": "2023-12-18T13:36:42.300000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Various MediaTek chip ril denial of service vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/372251"
},
{
"title": "MediaTek Fixes for chip security vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=209978"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-87959"
},
{
"db": "CNNVD",
"id": "CNNVD-202210-339"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.0
},
{
"problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-018867"
},
{
"db": "NVD",
"id": "CVE-2022-32591"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "https://corp.mediatek.com/product-security-bulletin/october-2022"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32591"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-32591/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-87959"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-018867"
},
{
"db": "NVD",
"id": "CVE-2022-32591"
},
{
"db": "CNNVD",
"id": "CNNVD-202210-339"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2022-87959"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-018867"
},
{
"db": "NVD",
"id": "CVE-2022-32591"
},
{
"db": "CNNVD",
"id": "CNNVD-202210-339"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-12-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-87959"
},
{
"date": "2023-10-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-018867"
},
{
"date": "2022-10-07T20:15:14.823000",
"db": "NVD",
"id": "CVE-2022-32591"
},
{
"date": "2022-10-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202210-339"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-12-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-87959"
},
{
"date": "2023-10-23T08:14:00",
"db": "JVNDB",
"id": "JVNDB-2022-018867"
},
{
"date": "2022-10-12T13:52:41.910000",
"db": "NVD",
"id": "CVE-2022-32591"
},
{
"date": "2022-10-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202210-339"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202210-339"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Google\u00a0 of \u00a0Android\u00a0 Input verification vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-018867"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202210-339"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…