First published: Mon Dec 05 2022(Updated: )
In Wi-Fi, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441630; Issue ID: ALPS07441630.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Yoctoproject Yocto | =3.1 | |
Yoctoproject Yocto | =3.3 | |
Mediatek Mt6580 | ||
Mediatek Mt6735 | ||
Mediatek Mt6765 | ||
Mediatek Mt6768 | ||
Mediatek Mt6771 | ||
Mediatek Mt6779 | ||
Mediatek Mt6785 | ||
Mediatek Mt6833 | ||
Mediatek Mt6853 | ||
Mediatek Mt6873 | ||
Mediatek Mt6877 | ||
Mediatek Mt6885 | ||
Mediatek Mt6983 | ||
Mediatek Mt7663 | ||
Mediatek Mt7668 | ||
Mediatek Mt7902 | ||
Mediatek Mt7921 | ||
Mediatek Mt7933 | ||
Mediatek Mt8168 | ||
Mediatek Mt8365 | ||
Mediatek Mt8518 | ||
Mediatek Mt8532 | ||
Mediatek Mt8666 | ||
Mediatek Mt8667 | ||
Mediatek Mt8675 | ||
Mediatek Mt8695 | ||
Google Android | ||
Mediatek Mt8766 | ||
Mediatek Mt8768 | ||
Mediatek Mt8786 | ||
Mediatek Mt8789 | ||
Mediatek Mt8791 | ||
Mediatek Mt8797 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-32632.
The severity of CVE-2022-32632 is medium with a score of 6.7.
The affected software includes Google Android versions 11.0, 12.0, and 13.0, as well as Yocto Project versions 3.1 and 3.3.
No, user interaction is not needed for exploitation of CVE-2022-32632.
To patch CVE-2022-32632, apply the patch with ID ALPS07441630 provided by MediaTek.