Lucene search

K
nvd[email protected]NVD:CVE-2022-32590
HistoryOct 07, 2022 - 8:15 p.m.

CVE-2022-32590

2022-10-0720:15:14
CWE-754
web.nvd.nist.gov
4
wlan
use after free
local privilege escalation
system execution privileges

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

In wlan, there is a possible use after free due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07299425; Issue ID: ALPS07299425.

Affected configurations

Nvd
Node
linuxfoundationyoctoMatch3.1
OR
linuxfoundationyoctoMatch3.3
OR
googleandroidMatch11.0
OR
googleandroidMatch12.0
AND
mediatekmt6761Match-
OR
mediatekmt6762Match-
OR
mediatekmt6765Match-
OR
mediatekmt6768Match-
OR
mediatekmt6769Match-
OR
mediatekmt6779Match-
OR
mediatekmt6781Match-
OR
mediatekmt6785Match-
OR
mediatekmt6789Match-
OR
mediatekmt6833Match-
OR
mediatekmt6853Match-
OR
mediatekmt6853tMatch-
OR
mediatekmt6855Match-
OR
mediatekmt6873Match-
OR
mediatekmt6877Match-
OR
mediatekmt6879Match-
OR
mediatekmt6883Match-
OR
mediatekmt6885Match-
OR
mediatekmt6889Match-
OR
mediatekmt6891Match-
OR
mediatekmt6893Match-
OR
mediatekmt6895Match-
OR
mediatekmt6983Match-
OR
mediatekmt7663Match-
OR
mediatekmt7668Match-
OR
mediatekmt7902Match-
OR
mediatekmt7921Match-
OR
mediatekmt8167sMatch-
OR
mediatekmt8175Match-
OR
mediatekmt8183Match-
OR
mediatekmt8185Match-
OR
mediatekmt8362aMatch-
OR
mediatekmt8365Match-
OR
mediatekmt8385Match-
OR
mediatekmt8512aMatch-
OR
mediatekmt8518Match-
OR
mediatekmt8532Match-
OR
mediatekmt8667Match-
OR
mediatekmt8695Match-
OR
mediatekmt8696Match-
OR
mediatekmt8766Match-
OR
mediatekmt8768Match-
OR
mediatekmt8786Match-
OR
mediatekmt8788Match-
OR
mediatekmt8789Match-
VendorProductVersionCPE
linuxfoundationyocto3.1cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*
linuxfoundationyocto3.3cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*
googleandroid11.0cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
googleandroid12.0cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
mediatekmt6761-cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
mediatekmt6762-cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*
mediatekmt6765-cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
mediatekmt6768-cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
mediatekmt6769-cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
mediatekmt6779-cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 491

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for NVD:CVE-2022-32590