Lucene search

K
cveMediaTekCVE-2023-32820
HistoryOct 02, 2023 - 3:15 a.m.

CVE-2023-32820

2023-10-0203:15:09
CWE-617
CWE-20
MediaTek
web.nvd.nist.gov
65
wlan firmware
firmware assertion
denial of service
remote
nvd
cve-2023-32820

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

27.2%

In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637.

Affected configurations

Nvd
Vulners
Node
linuxfoundationyoctoMatch3.1
OR
linuxfoundationyoctoMatch3.3
OR
mediatekiot_yoctoMatch23.0
OR
googleandroidMatch11.0
OR
googleandroidMatch12.0
OR
googleandroidMatch13.0
OR
linuxlinux_kernelMatch4.19-
AND
mediatekmt5221Match-
OR
mediatekmt6781Match-
OR
mediatekmt6833Match-
OR
mediatekmt6853Match-
OR
mediatekmt6853tMatch-
OR
mediatekmt6855Match-
OR
mediatekmt6873Match-
OR
mediatekmt6875Match-
OR
mediatekmt6877Match-
OR
mediatekmt6879Match-
OR
mediatekmt6883Match-
OR
mediatekmt6885Match-
OR
mediatekmt6886Match-
OR
mediatekmt6889Match-
OR
mediatekmt6891Match-
OR
mediatekmt6893Match-
OR
mediatekmt6895Match-
OR
mediatekmt6983Match-
OR
mediatekmt6985Match-
OR
mediatekmt7663Match-
OR
mediatekmt7668Match-
OR
mediatekmt7902Match-
OR
mediatekmt7921Match-
OR
mediatekmt8168Match-
OR
mediatekmt8365Match-
OR
mediatekmt8518sMatch-
OR
mediatekmt8532Match-
OR
mediatekmt8666Match-
OR
mediatekmt8673Match-
OR
mediatekmt8675Match-
OR
mediatekmt8695Match-
OR
mediatekmt8766Match-
OR
mediatekmt8768Match-
OR
mediatekmt8781Match-
OR
mediatekmt8786Match-
OR
mediatekmt8789Match-
OR
mediatekmt8791Match-
OR
mediatekmt8797Match-
OR
mediatekmt8798Match-
VendorProductVersionCPE
linuxfoundationyocto3.1cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*
linuxfoundationyocto3.3cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*
mediatekiot_yocto23.0cpe:2.3:a:mediatek:iot_yocto:23.0:*:*:*:*:*:*:*
googleandroid11.0cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
googleandroid12.0cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
googleandroid13.0cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
linuxlinux_kernel4.19cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:*
mediatekmt5221-cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*
mediatekmt6781-cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
mediatekmt6833-cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 461

CNA Affected

[
  {
    "vendor": "MediaTek, Inc.",
    "product": "MT5221, MT6781, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT7663, MT7668, MT7902, MT7921, MT8168, MT8365, MT8518S, MT8532, MT8666, MT8673, MT8675, MT8695, MT8766, MT8768, MT8781, MT8786, MT8789, MT8791, MT8797, MT8798",
    "versions": [
      {
        "version": "Android 11.0, 12.0, 13.0 / Linux 4.19 / Yocto 3.1, 3.3 / IOT-v23.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

27.2%

Related for CVE-2023-32820