First published: Mon Dec 05 2022(Updated: )
In Wi-Fi, there is a possible memory access violation due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441637; Issue ID: ALPS07441637.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =11.0 | |
Android | =12.0 | |
Android | =13.0 | |
The Yocto Project | =3.1 | |
The Yocto Project | =3.3 | |
Mediatek MT6580 | ||
MediaTek MT6739 | ||
MediaTek MT6761 | ||
MediaTek MT6762M | ||
MediaTek MT6765 | ||
MediaTek MT6768 | ||
MediaTek MT6769 | ||
MediaTek MT6771 | ||
MediaTek MT6779 | ||
MediaTek MT6781 | ||
MediaTek MT6785T | ||
MediaTek M6789 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6875T | ||
MediaTek MT6877 | ||
MediaTek MT6879 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6891 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT7902 | ||
MediaTek MT7921 | ||
MediaTek MT8167S Firmware | ||
MediaTek MT8168 | ||
MediaTek MT8175 Firmware | ||
MediaTek MT8183 | ||
MediaTek MT8185 | ||
MediaTek MT8362A Firmware | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8385 Firmware | ||
MediaTek MT8518 | ||
MediaTek MT8532 | ||
MediaTek MT8675 | ||
MediaTek MT8695 Firmware | ||
MediaTek MT8696 Firmware | ||
MediaTek MT8766Z | ||
MediaTek MT8768 | ||
MediaTek MT8786 | ||
MediaTek MT8788 Firmware | ||
MediaTek MT8789 | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8797 WiFi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32633 is a vulnerability in Wi-Fi that could lead to a local escalation of privilege with system execution privileges needed.
CVE-2022-32633 has a severity level of 6.7, which is categorized as medium.
CVE-2022-32633 affects Google Android versions 11.0, 12.0, and 13.0, as well as Yocto Project versions 3.1 and 3.3.
No, user interaction is not needed for exploitation of CVE-2022-32633.
To fix CVE-2022-32633, it is recommended to apply the patch with the ID ALPS07441637 provided by the vendor.