First published: Wed Jul 06 2022(Updated: )
In WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704482.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
Mediatek Mt6761 | ||
Mediatek Mt6779 | ||
Mediatek Mt6781 | ||
Mediatek Mt6833 | ||
Mediatek Mt6853 | ||
Mediatek Mt6873 | ||
Mediatek Mt6877 | ||
Mediatek Mt6879 | ||
Mediatek Mt6883 | ||
Mediatek Mt6885 | ||
Mediatek Mt6889 | ||
Mediatek Mt6893 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt8167s | ||
Mediatek Mt8168 | ||
Mediatek Mt8175 | ||
Mediatek Mt8183 | ||
Mediatek Mt8185 | ||
Mediatek Mt8362a | ||
Mediatek Mt8365 | ||
Mediatek Mt8385 | ||
Mediatek Mt8667 | ||
Mediatek Mt8675 | ||
Google Android | ||
Mediatek Mt8766 | ||
Mediatek Mt8768 | ||
Mediatek Mt8786 | ||
Mediatek Mt8788 | ||
Mediatek Mt8789 | ||
Mediatek Mt8791 | ||
Mediatek Mt8797 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-21783 is medium with a CVSS score of 6.7.
No, user interaction is not needed for exploitation of CVE-2022-21783.
The affected software includes Google Android 11.0 and 12.0.
To fix CVE-2022-21783, it is recommended to apply the patch ID ALPS06704526 provided by MediaTek.
More information about CVE-2022-21783 can be found at the MediaTek Product Security Bulletin for July 2022.