First published: Thu Apr 06 2023(Updated: )
In vdec, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07608575; Issue ID: ALPS07608575.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Android | =12.0 | |
Android | =13.0 | |
Any of | ||
MediaTek M6789 | ||
MediaTek MT6855 | ||
MediaTek MT6879 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT8673 | ||
MediaTek MT8781 WiFi | ||
MediaTek MT8795T | ||
MediaTek MT8798 | ||
MediaTek MT8891 | ||
Android | =12.0 | |
Android | =13.0 | |
MediaTek M6789 | ||
MediaTek MT6855 | ||
MediaTek MT6879 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT8673 | ||
MediaTek MT8781 WiFi | ||
MediaTek MT8795T | ||
MediaTek MT8798 | ||
MediaTek MT8891 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-20685.
The severity level of CVE-2023-20685 is medium, with a severity value of 6.4.
Google Android versions 12.0 and 13.0 are affected by CVE-2023-20685.
No, user interaction is not needed for the exploitation of CVE-2023-20685.
To fix CVE-2023-20685, apply the patch with ID ALPS07608575 provided by MediaTek. Make sure to follow their product security bulletin for updates.