First published: Mon May 15 2023(Updated: )
In isp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07162155; Issue ID: ALPS07162155.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =12.0 | |
Google Android | =13.0 | |
Yoctoproject Yocto | =4.0 | |
Mediatek Mt6879 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt8195 | ||
Mediatek Mt8395 | ||
Mediatek Mt8673 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20721 is medium.
The CVE-2023-20721 vulnerability can be exploited without user interaction.
Google Android versions 12.0 and 13.0, and Yoctoproject Yocto version 4.0 are affected by CVE-2023-20721.
No, Mediatek Mt6879 is not vulnerable to CVE-2023-20721.
Yes, there is a patch available for CVE-2023-20721. Refer to the provided reference link for more information.