Lucene search

K
cveMediaTekCVE-2023-20819
HistoryOct 02, 2023 - 3:15 a.m.

CVE-2023-20819

2023-10-0203:15:09
CWE-787
MediaTek
web.nvd.nist.gov
40
information security
cdma
ppp
remote exploitation
privilege escalation
vulnerability
nvd
cve-2023-20819

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0.003

Percentile

68.6%

In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.

Affected configurations

Nvd
Node
mediateklr11Match-
OR
mediateklr12aMatch-
OR
mediateklr13Match-
OR
mediateknr15Match-
OR
mediateknr16Match-
OR
mediateknr17Match-
AND
mediatekmt2731Match-
OR
mediatekmt6570Match-
OR
mediatekmt6580Match-
OR
mediatekmt6595Match-
OR
mediatekmt6732Match-
OR
mediatekmt6735Match-
OR
mediatekmt6737Match-
OR
mediatekmt6737mMatch-
OR
mediatekmt6738Match-
OR
mediatekmt6739Match-
OR
mediatekmt6750Match-
OR
mediatekmt6750sMatch-
OR
mediatekmt6752Match-
OR
mediatekmt6753Match-
OR
mediatekmt6755Match-
OR
mediatekmt6757Match-
OR
mediatekmt6758Match-
OR
mediatekmt6761Match-
OR
mediatekmt6762Match-
OR
mediatekmt6762dMatch-
OR
mediatekmt6762mMatch-
OR
mediatekmt6763Match-
OR
mediatekmt6765Match-
OR
mediatekmt6765tMatch-
OR
mediatekmt6767Match-
OR
mediatekmt6768Match-
OR
mediatekmt6769Match-
OR
mediatekmt6769tMatch-
OR
mediatekmt6769zMatch-
OR
mediatekmt6771Match-
OR
mediatekmt6775Match-
OR
mediatekmt6779Match-
OR
mediatekmt6781Match-
OR
mediatekmt6783Match-
OR
mediatekmt6785Match-
OR
mediatekmt6785tMatch-
OR
mediatekmt6789Match-
OR
mediatekmt6795Match-
OR
mediatekmt6797Match-
OR
mediatekmt6799Match-
OR
mediatekmt6813Match-
OR
mediatekmt6815Match-
OR
mediatekmt6833Match-
OR
mediatekmt6835Match-
OR
mediatekmt6853Match-
OR
mediatekmt6855Match-
OR
mediatekmt6873Match-
OR
mediatekmt6875Match-
OR
mediatekmt6875tMatch-
OR
mediatekmt6877Match-
OR
mediatekmt6878Match-
OR
mediatekmt6879Match-
OR
mediatekmt6883Match-
OR
mediatekmt6885Match-
OR
mediatekmt6886Match-
OR
mediatekmt6889Match-
OR
mediatekmt6891Match-
OR
mediatekmt6893Match-
OR
mediatekmt6895Match-
OR
mediatekmt6895tMatch-
OR
mediatekmt6896Match-
OR
mediatekmt6897Match-
OR
mediatekmt6983Match-
OR
mediatekmt6985Match-
OR
mediatekmt6989Match-
OR
mediatekmt8666Match-
OR
mediatekmt8666aMatch-
OR
mediatekmt8667Match-
OR
mediatekmt8673Match-
OR
mediatekmt8675Match-
OR
mediatekmt8765Match-
OR
mediatekmt8766Match-
OR
mediatekmt8766zMatch-
OR
mediatekmt8768Match-
OR
mediatekmt8768aMatch-
OR
mediatekmt8768bMatch-
OR
mediatekmt8768tMatch-
OR
mediatekmt8768zMatch-
OR
mediatekmt8781Match-
OR
mediatekmt8786Match-
OR
mediatekmt8788Match-
OR
mediatekmt8788tMatch-
OR
mediatekmt8788xMatch-
OR
mediatekmt8788zMatch-
OR
mediatekmt8791Match-
OR
mediatekmt8791tMatch-
OR
mediatekmt8797Match-
OR
mediatekmt8798Match-
VendorProductVersionCPE
mediateklr11-cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*
mediateklr12a-cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*
mediateklr13-cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*
mediateknr15-cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*
mediateknr16-cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*
mediateknr17-cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*
mediatekmt2731-cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*
mediatekmt6570-cpe:2.3:h:mediatek:mt6570:-:*:*:*:*:*:*:*
mediatekmt6580-cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*
mediatekmt6595-cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 941

CNA Affected

[
  {
    "vendor": "MediaTek, Inc.",
    "product": "MT2731, MT6570, MT6580, MT6595, MT6732, MT6735, MT6737, MT6737M, MT6738, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6757, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6795, MT6797, MT6799, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6983, MT6985, MT6989, MT8666, MT8666A, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766Z, MT8768, MT8768A, MT8768B, MT8768T, MT8768Z, MT8781, MT8786, MT8788, MT8788T, MT8788X, MT8788Z, MT8791, MT8791T, MT8797, MT8798",
    "versions": [
      {
        "version": "Modem LR11, LR12A, LR13, NR15, NR16, NR17",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0.003

Percentile

68.6%

Related for CVE-2023-20819