First published: Mon Nov 07 2022(Updated: )
In telephony, there is a possible permission bypass due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319132; Issue ID: ALPS07319132.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =10.0 | |
Android | =11.0 | |
Android | =12.0 | |
MediaTek MT6739 | ||
MediaTek MT6761 | ||
MediaTek MT6762M | ||
MediaTek MT6763 | ||
MediaTek MT6765 | ||
MediaTek MT6768 | ||
MediaTek MT6769 | ||
MediaTek MT6771 | ||
MediaTek MT6779 | ||
MediaTek MT6781 | ||
MediaTek MT6785T | ||
MediaTek M6789 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6853T | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6875T | ||
MediaTek MT6877 | ||
MediaTek MT6879 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6891 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT8321 | ||
MediaTek MT8385 Firmware | ||
MediaTek MT8666 | ||
MediaTek MT8675 | ||
MediaTek MT8765 | ||
MediaTek MT8766Z | ||
MediaTek MT8768 | ||
MediaTek MT8786 | ||
MediaTek MT8788 Firmware | ||
MediaTek MT8789 | ||
MediaTek MT8795T | ||
MediaTek MT8797 WiFi | ||
MediaTek MT8798 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32601 is a vulnerability in telephony that allows a permission bypass due to a parcel format mismatch, leading to local escalation of privilege without additional execution privileges.
The severity of CVE-2022-32601 is high with a severity value of 7.8.
CVE-2022-32601 can be exploited without user interaction.
The patch ID for CVE-2022-32601 is ALPS07319132.
More information about CVE-2022-32601 can be found at the following references: [Reference 1](https://corp.mediatek.com/product-security-bulletin/November-2022), [Reference 2](https://source.android.com/docs/security/bulletin/2022-11-01/#asterisk), [Reference 3](https://source.android.com/docs/security/bulletin/2022-11-01).