First published: Tue Jun 06 2023(Updated: )
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588531; Issue ID: ALPS07588531.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Yocto | =4.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek Mt6789 | ||
Mediatek Mt6835 | ||
Mediatek Mt6855 | ||
Mediatek Mt6879 | ||
Mediatek Mt6886 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt6985 | ||
Mediatek Mt8168 | ||
Mediatek Mt8365 | ||
Mediatek Mt8695 | ||
Mediatek Mt8766 | ||
Mediatek Mt8768 | ||
Mediatek Mt8781 | ||
Mediatek Mt8786 | ||
Mediatek Mt8789 | ||
Mediatek Mt8791t | ||
Mediatek Mt8797 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-20727.
The severity of CVE-2023-20727 is medium, with a severity value of 4.4.
The affected software includes Linuxfoundation Yocto 4.0, Google Android 12.0 and 13.0.
No, user interaction is not needed for exploitation of CVE-2023-20727.
To fix CVE-2023-20727, apply the patch with ID ALPS07588531 from the vendor.