First published: Tue Jun 06 2023(Updated: )
In swpm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780926.
Credit: security@mediatek.com security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Android | =13.0 | |
Any of | ||
MediaTek M6789 | ||
MediaTek MT6835 | ||
MediaTek MT6855 | ||
MediaTek MT6879 | ||
MediaTek MT6886 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT6985T | ||
Mediatek MT8167 | ||
MediaTek MT8167S Firmware | ||
MediaTek MT8168 | ||
MediaTek MT8175 Firmware | ||
MediaTek MT8195Z | ||
MediaTek MT8321 | ||
MediaTek MT8362A Firmware | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8385 Firmware | ||
MediaTek MT8673 | ||
MediaTek MT8765 | ||
MediaTek MT8766Z | ||
MediaTek MT8768 | ||
MediaTek MT8781 WiFi | ||
MediaTek MT8786 | ||
MediaTek MT8788 Firmware | ||
MediaTek MT8791T | ||
MediaTek MT8797 WiFi | ||
Android | =13.0 | |
MediaTek M6789 | ||
MediaTek MT6835 | ||
MediaTek MT6855 | ||
MediaTek MT6879 | ||
MediaTek MT6886 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT6985T | ||
Mediatek MT8167 | ||
MediaTek MT8167S Firmware | ||
MediaTek MT8168 | ||
MediaTek MT8175 Firmware | ||
MediaTek MT8195Z | ||
MediaTek MT8321 | ||
MediaTek MT8362A Firmware | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8385 Firmware | ||
MediaTek MT8673 | ||
MediaTek MT8765 | ||
MediaTek MT8766Z | ||
MediaTek MT8768 | ||
MediaTek MT8781 WiFi | ||
MediaTek MT8786 | ||
MediaTek MT8788 Firmware | ||
MediaTek MT8791T | ||
MediaTek MT8797 WiFi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20749 is medium with a severity value of 6.7.
Google Android version 13.0 is affected by CVE-2023-20749.
No, Mediatek Mt6789 is not vulnerable to CVE-2023-20749.
No, user interaction is not needed for exploitation of CVE-2023-20749.
You can patch CVE-2023-20749 by following the instructions provided in Patch ID: ALPS07780926; Issue ID: ALPS07780926.