First published: Fri Oct 07 2022(Updated: )
In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Yocto | =3.1 | |
Linuxfoundation Yocto | =3.3 | |
Google Android | =11.0 | |
Google Android | =12.0 | |
Mediatek Mt6761 | ||
Mediatek Mt6762 | ||
Mediatek Mt6765 | ||
Mediatek Mt6768 | ||
Mediatek Mt6779 | ||
Mediatek Mt6781 | ||
Mediatek Mt6785 | ||
Mediatek Mt6789 | ||
Mediatek Mt6833 | ||
Mediatek Mt6853 | ||
Mediatek Mt6873 | ||
Mediatek Mt6875 | ||
Mediatek Mt6877 | ||
Mediatek Mt6879 | ||
Mediatek Mt6883 | ||
Mediatek Mt6885 | ||
Mediatek Mt6889 | ||
Mediatek Mt6891 | ||
Mediatek Mt6893 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt7663 | ||
Mediatek Mt7668 | ||
Mediatek Mt7902 | ||
Mediatek Mt7921 | ||
Mediatek Mt8167s | ||
Mediatek Mt8175 | ||
Mediatek Mt8183 | ||
Mediatek Mt8185 | ||
Mediatek Mt8362a | ||
Mediatek Mt8365 | ||
Mediatek Mt8385 | ||
Mediatek Mt8512a | ||
Mediatek Mt8518 | ||
Mediatek Mt8532 | ||
Mediatek Mt8667 | ||
Mediatek Mt8766 | ||
Mediatek Mt8768 | ||
Mediatek Mt8786 | ||
Mediatek Mt8788 | ||
Mediatek Mt8789 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Wi-Fi driver vulnerability is CVE-2022-32589.
The severity of CVE-2022-32589 is high with a severity value of 7.5.
The affected software for CVE-2022-32589 includes Linuxfoundation Yocto 3.1 and 3.3, Google Android 11.0 and 12.0.
No, user interaction is not needed for exploitation of CVE-2022-32589.
To patch or fix CVE-2022-32589, apply the patched version provided by the vendor or follow the mitigation steps recommended by the vendor.