7.5
CWE
404
Advisory Published
Updated

CVE-2022-32589

First published: Fri Oct 07 2022(Updated: )

In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600.

Credit: security@mediatek.com

Affected SoftwareAffected VersionHow to fix
Linuxfoundation Yocto=3.1
Linuxfoundation Yocto=3.3
Google Android=11.0
Google Android=12.0
Mediatek Mt6761
Mediatek Mt6762
Mediatek Mt6765
Mediatek Mt6768
Mediatek Mt6779
Mediatek Mt6781
Mediatek Mt6785
Mediatek Mt6789
Mediatek Mt6833
Mediatek Mt6853
Mediatek Mt6873
Mediatek Mt6875
Mediatek Mt6877
Mediatek Mt6879
Mediatek Mt6883
Mediatek Mt6885
Mediatek Mt6889
Mediatek Mt6891
Mediatek Mt6893
Mediatek Mt6895
Mediatek Mt6983
Mediatek Mt7663
Mediatek Mt7668
Mediatek Mt7902
Mediatek Mt7921
Mediatek Mt8167s
Mediatek Mt8175
Mediatek Mt8183
Mediatek Mt8185
Mediatek Mt8362a
Mediatek Mt8365
Mediatek Mt8385
Mediatek Mt8512a
Mediatek Mt8518
Mediatek Mt8532
Mediatek Mt8667
Mediatek Mt8766
Mediatek Mt8768
Mediatek Mt8786
Mediatek Mt8788
Mediatek Mt8789

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this Wi-Fi driver vulnerability?

    The vulnerability ID for this Wi-Fi driver vulnerability is CVE-2022-32589.

  • What is the severity of CVE-2022-32589?

    The severity of CVE-2022-32589 is high with a severity value of 7.5.

  • What is the affected software for CVE-2022-32589?

    The affected software for CVE-2022-32589 includes Linuxfoundation Yocto 3.1 and 3.3, Google Android 11.0 and 12.0.

  • Is user interaction required for exploitation of CVE-2022-32589?

    No, user interaction is not needed for exploitation of CVE-2022-32589.

  • How can I patch or fix CVE-2022-32589?

    To patch or fix CVE-2022-32589, apply the patched version provided by the vendor or follow the mitigation steps recommended by the vendor.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203