First published: Tue Jul 04 2023(Updated: )
In wlan firmware, there is possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07664711; Issue ID: ALPS07664711.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Yocto | =4.0 | |
Google Android | =11.0 | |
Google Android | =12.0 | |
Mediatek Mt6739 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt8167 | ||
Mediatek Mt8168 | ||
Mediatek Mt8195 | ||
Mediatek Mt8321 | ||
Mediatek Mt8365 | ||
Mediatek Mt8385 | ||
Mediatek Mt8666 | ||
Mediatek Mt8765 | ||
Mediatek Mt8781 | ||
Mediatek Mt8788 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20693 is high with a severity value of 7.5.
The CVE-2023-20693 vulnerability can be exploited remotely without user interaction, leading to a denial of service.
The affected software versions include Linuxfoundation Yocto 4.0, Google Android 11.0, and Google Android 12.0.
No, the Mediatek Mt6739 device is not vulnerable to CVE-2023-20693.
You can find more information about CVE-2023-20693 on the MediaTek Product Security Bulletin for July 2023.