First published: Tue Mar 07 2023(Updated: )
In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629576; Issue ID: ALPS07629576.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek Mt6853 | ||
Mediatek Mt6853t | ||
Mediatek Mt6875 | ||
Mediatek Mt6877 | ||
Mediatek Mt6879 | ||
Mediatek Mt6883 | ||
Mediatek Mt6885 | ||
Mediatek Mt6889 | ||
Mediatek Mt6891 | ||
Mediatek Mt6893 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt8195z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20651 is medium with a CVSS score of 4.4.
To fix CVE-2023-20651, apply the provided patch ID: ALPS07629576 or update to a version of the affected software that includes the fix.
No, user interaction is not needed for exploitation of CVE-2023-20651.
The software versions affected by CVE-2023-20651 are Google Android 12.0 and 13.0.
No, Mediatek Mt6853, Mt6853t, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, and Mt8195z are not vulnerable to CVE-2023-20651.