First published: Wed Jul 06 2022(Updated: )
In WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704482.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
MediaTek MT6761 | ||
MediaTek MT6779 | ||
MediaTek MT6781 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6873 | ||
MediaTek MT6877 | ||
MediaTek MT6879 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT8167S Firmware | ||
MediaTek MT8168 | ||
MediaTek MT8175 Firmware | ||
MediaTek MT8183 | ||
MediaTek MT8185 | ||
MediaTek MT8362A Firmware | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8385 Firmware | ||
MediaTek MT8667 | ||
MediaTek MT8675 | ||
MediaTek MT8696 Firmware | ||
MediaTek MT8766Z | ||
MediaTek MT8768 | ||
mediatek mt8786 | ||
MediaTek MT8788 Firmware | ||
MediaTek MT8789 | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8797 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-21783 is medium with a CVSS score of 6.7.
No, user interaction is not needed for exploitation of CVE-2022-21783.
The affected software includes Google Android 11.0 and 12.0.
To fix CVE-2022-21783, it is recommended to apply the patch ID ALPS06704526 provided by MediaTek.
More information about CVE-2022-21783 can be found at the MediaTek Product Security Bulletin for July 2022.