First published: Mon May 15 2023(Updated: )
In vcu, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519103.
Credit: security@mediatek.com security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
MediaTek IoT Yocto | =22.2 | |
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Any of | ||
Mediatek MT5696 | ||
MediaTek MT5836 | ||
MediaTek MT5838 | ||
MediaTek MT6768 | ||
MediaTek MT6769 | ||
MediaTek MT6779 | ||
MediaTek MT6781 | ||
MediaTek MT6785T | ||
MediaTek M6789 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
mediatek mt6853t | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6875T | ||
MediaTek MT6877 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6891 | ||
MediaTek MT6893 | ||
MediaTek MT8185 | ||
MediaTek MT8195 | ||
MediaTek MT8395 | ||
MediaTek MT8781 | ||
mediatek mt8786 | ||
MediaTek MT8789 | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8797 | ||
MediaTek MT9000 | ||
MediaTek MT9023 | ||
MediaTek MT9025 | ||
MediaTek MT9618 | ||
MediaTek MT9653 | ||
Mediatek MT9687 | ||
MediaTek MT9689 | ||
MediaTek MT9902 | ||
Mediatek MT9932 | ||
MediaTek MT9952 | ||
MediaTek MT9972 | ||
MediaTek MT9982 | ||
MediaTek IoT Yocto | =22.2 | |
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek MT5696 | ||
MediaTek MT5836 | ||
MediaTek MT5838 | ||
MediaTek MT6768 | ||
MediaTek MT6769 | ||
MediaTek MT6779 | ||
MediaTek MT6781 | ||
MediaTek MT6785T | ||
MediaTek M6789 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
mediatek mt6853t | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6875T | ||
MediaTek MT6877 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6891 | ||
MediaTek MT6893 | ||
MediaTek MT8185 | ||
MediaTek MT8195 | ||
MediaTek MT8395 | ||
MediaTek MT8781 | ||
mediatek mt8786 | ||
MediaTek MT8789 | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8797 | ||
MediaTek MT9000 | ||
MediaTek MT9023 | ||
MediaTek MT9025 | ||
MediaTek MT9618 | ||
MediaTek MT9653 | ||
Mediatek MT9687 | ||
MediaTek MT9689 | ||
MediaTek MT9902 | ||
Mediatek MT9932 | ||
MediaTek MT9952 | ||
MediaTek MT9972 | ||
MediaTek MT9982 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20673 is rated as medium.
No, user interaction is not needed for exploitation of CVE-2023-20673.
To fix CVE-2023-20673, apply the provided patch ID: ALPS07519103.
The following software versions are affected by CVE-2023-20673: Mediatek Iot Yocto 22.2, Google Android 11.0, Google Android 12.0, and Google Android 13.0.
You can find more information about CVE-2023-20673 at the following reference link: [https://corp.mediatek.com/product-security-bulletin/May-2023](https://corp.mediatek.com/product-security-bulletin/May-2023)