First published: Tue Jan 03 2023(Updated: )
In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705059; Issue ID: GN20220705059.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mediatek Mt7603 Firmware | =7.6.6.0 | |
Mediatek Mt7603 | ||
Mediatek Mt7613 Firmware | =7.6.6.0 | |
Mediatek Mt7613 | ||
Mediatek Mt7615 Firmware | =7.6.6.0 | |
Mediatek Mt7615 | ||
Mediatek Mt7622 Firmware | =7.6.6.0 | |
Mediatek Mt7622 | ||
Mediatek Mt7628 Firmware | =7.6.6.0 | |
Mediatek Mt7628 | ||
Mediatek Mt7629 Firmware | =7.6.6.0 | |
Mediatek Mt7629 | ||
Mediatek Mt7915 Firmware | =7.6.6.0 | |
Mediatek Mt7915 | ||
Mediatek Mt7916 Firmware | =7.6.6.0 | |
Mediatek Mt7916 | ||
Mediatek Mt7981 Firmware | =7.6.6.0 | |
Mediatek Mt7981 | ||
Mediatek Mt7986 Firmware | =7.6.6.0 | |
Mediatek Mt7986 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-32658.
CVE-2022-32658 has a severity level of medium.
No, user interaction is not needed for exploitation of CVE-2022-32658.
The affected software version for CVE-2022-32658 is Mediatek Mt7603 firmware 7.6.6.0.
To fix the CVE-2022-32658 vulnerability, apply the patch with ID GN20220705059 provided by Mediatek.