First published: Fri Oct 07 2022(Updated: )
In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Yocto Project | =3.1 | |
Yocto Project | =3.3 | |
Android | =11.0 | |
Android | =12.0 | |
MediaTek MT6761 | ||
MediaTek MT6762M | ||
MediaTek MT6765 | ||
MediaTek MT6768 | ||
MediaTek MT6779 | ||
MediaTek MT6781 | ||
MediaTek MT6785T | ||
MediaTek M6789 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6873 | ||
MediaTek MT6875T | ||
MediaTek MT6877 | ||
MediaTek MT6879 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6891 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT7663 Firmware | ||
MediaTek MT7668 Firmware | ||
MediaTek MT7902 | ||
MediaTek MT7921 | ||
MediaTek MT8167S Firmware | ||
MediaTek MT8175 Firmware | ||
MediaTek MT8183 | ||
MediaTek MT8185 | ||
MediaTek MT8362A Firmware | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8385 Firmware | ||
MediaTek MT8512A | ||
MediaTek MT8518 | ||
MediaTek MT8532 | ||
MediaTek MT8667 | ||
MediaTek MT8766Z | ||
MediaTek MT8768 | ||
MediaTek MT8786 | ||
MediaTek MT8788 Firmware | ||
MediaTek MT8789 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Wi-Fi driver vulnerability is CVE-2022-32589.
The severity of CVE-2022-32589 is high with a severity value of 7.5.
The affected software for CVE-2022-32589 includes Linuxfoundation Yocto 3.1 and 3.3, Google Android 11.0 and 12.0.
No, user interaction is not needed for exploitation of CVE-2022-32589.
To patch or fix CVE-2022-32589, apply the patched version provided by the vendor or follow the mitigation steps recommended by the vendor.