First published: Tue Jan 03 2023(Updated: )
In mtk-aie, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262617; Issue ID: ALPS07262617.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =11.0 | |
Android | =12.0 | |
Android | =13.0 | |
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6877 | ||
MediaTek MT6893 | ||
MediaTek MT8791 WiFi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-32652 is medium with a severity value of 6.7.
No, user interaction is not needed for exploitation of CVE-2022-32652.
CVE-2022-32652 affects Google Android versions 11.0, 12.0, and 13.0.
To fix CVE-2022-32652, apply the patch with ID ALPS07262617 from the Mediatek Product Security Bulletin.
You can find more information about CVE-2022-32652 in the Mediatek Product Security Bulletin for January 2023.