First published: Tue Jul 04 2023(Updated: )
In Wi-Fi, there is a possible low throughput due to misrepresentation of critical information. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220829014; Issue ID: GN20220829014.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Yocto | =4.0 | |
Mediatek Mt7603 Firmware | =7.6.6.0 | |
Mediatek Mt7603 | ||
Mediatek Mt7613 Firmware | =7.6.6.0 | |
Mediatek Mt7613 | ||
Mediatek Mt7615 Firmware | =7.6.6.0 | |
Mediatek Mt7615 | ||
Mediatek Mt7622 Firmware | =7.6.6.0 | |
Mediatek Mt7622 | ||
Mediatek Mt7628 Firmware | =7.6.6.0 | |
Mediatek Mt7628 | ||
Mediatek Mt7629 Firmware | =7.6.6.0 | |
Mediatek Mt7629 | ||
Mediatek Mt7915 Firmware | =7.6.6.0 | |
Mediatek Mt7915 | ||
Mediatek Mt7916 Firmware | =7.6.6.0 | |
Mediatek Mt7916 | ||
Mediatek Mt7981 Firmware | =7.6.6.0 | |
Mediatek Mt7981 | ||
Mediatek Mt7986 Firmware | =7.6.6.0 | |
Mediatek Mt7986 | ||
Mediatek Mt8365 Firmware | =7.6.6.0 | |
Mediatek Mt8365 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-32666.
The title of the vulnerability is 'In Wi-Fi there is a possible low throughput due to misrepresentation of critical information.'
The severity of the vulnerability is high with a severity value of 7.5.
No, user interaction is not needed for exploitation.
You can patch the vulnerability by applying Patch ID: GN20220829014 as provided by Mediatek. Check their website for more information.