First published: Mon Feb 06 2023(Updated: )
In display drm, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363599; Issue ID: ALPS07363599.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =11.0 | |
Android | =12.0 | |
Android | =13.0 | |
MediaTek MT6761 | ||
MediaTek MT6765 | ||
MediaTek MT6768 | ||
MediaTek MT6779 | ||
MediaTek MT6781 | ||
MediaTek MT6785T | ||
MediaTek M6789 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6877 | ||
MediaTek MT6879 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT8168 | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8675 | ||
All of | ||
Any of | ||
Android | =11.0 | |
Android | =12.0 | |
Android | =13.0 | |
Any of | ||
MediaTek MT6761 | ||
MediaTek MT6765 | ||
MediaTek MT6768 | ||
MediaTek MT6779 | ||
MediaTek MT6781 | ||
MediaTek MT6785T | ||
MediaTek M6789 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6877 | ||
MediaTek MT6879 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT8168 | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8675 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20608 is considered a vulnerability that could lead to local escalation of privilege requiring System execution privileges.
To fix CVE-2023-20608, you should apply the patch identified as ALPS07363599.
CVE-2023-20608 affects Google Android versions 11.0, 12.0, and 13.0.
No, user interaction is not needed for the exploitation of CVE-2023-20608.
CVE-2023-20608 can potentially allow attackers to escalate privileges locally and execute system-level commands.