Lucene search

K
cveMediaTekCVE-2022-32590
HistoryOct 07, 2022 - 8:15 p.m.

CVE-2022-32590

2022-10-0720:15:14
CWE-754
MediaTek
web.nvd.nist.gov
40
2
cve-2022-32590
wlan
local escalation
privilege
use after free
nvd

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

In wlan, there is a possible use after free due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07299425; Issue ID: ALPS07299425.

Affected configurations

Nvd
Vulners
Node
linuxfoundationyoctoMatch3.1
OR
linuxfoundationyoctoMatch3.3
OR
googleandroidMatch11.0
OR
googleandroidMatch12.0
AND
mediatekmt6761Match-
OR
mediatekmt6762Match-
OR
mediatekmt6765Match-
OR
mediatekmt6768Match-
OR
mediatekmt6769Match-
OR
mediatekmt6779Match-
OR
mediatekmt6781Match-
OR
mediatekmt6785Match-
OR
mediatekmt6789Match-
OR
mediatekmt6833Match-
OR
mediatekmt6853Match-
OR
mediatekmt6853tMatch-
OR
mediatekmt6855Match-
OR
mediatekmt6873Match-
OR
mediatekmt6877Match-
OR
mediatekmt6879Match-
OR
mediatekmt6883Match-
OR
mediatekmt6885Match-
OR
mediatekmt6889Match-
OR
mediatekmt6891Match-
OR
mediatekmt6893Match-
OR
mediatekmt6895Match-
OR
mediatekmt6983Match-
OR
mediatekmt7663Match-
OR
mediatekmt7668Match-
OR
mediatekmt7902Match-
OR
mediatekmt7921Match-
OR
mediatekmt8167sMatch-
OR
mediatekmt8175Match-
OR
mediatekmt8183Match-
OR
mediatekmt8185Match-
OR
mediatekmt8362aMatch-
OR
mediatekmt8365Match-
OR
mediatekmt8385Match-
OR
mediatekmt8512aMatch-
OR
mediatekmt8518Match-
OR
mediatekmt8532Match-
OR
mediatekmt8667Match-
OR
mediatekmt8695Match-
OR
mediatekmt8696Match-
OR
mediatekmt8766Match-
OR
mediatekmt8768Match-
OR
mediatekmt8786Match-
OR
mediatekmt8788Match-
OR
mediatekmt8789Match-
VendorProductVersionCPE
linuxfoundationyocto3.1cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*
linuxfoundationyocto3.3cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*
googleandroid11.0cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
googleandroid12.0cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
mediatekmt6761-cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
mediatekmt6762-cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*
mediatekmt6765-cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
mediatekmt6768-cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
mediatekmt6769-cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
mediatekmt6779-cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 491

CNA Affected

[
  {
    "vendor": "MediaTek, Inc.",
    "product": "MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8512A, MT8518, MT8532, MT8667, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789",
    "versions": [
      {
        "version": "Android 11.0, 12.0 and Yocto 3.1, 3.3",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for CVE-2022-32590