First published: Tue Jul 04 2023(Updated: )
In cmdq, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07636133; Issue ID: ALPS07634601.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek Mt6739 | ||
Mediatek Mt6768 | ||
Mediatek Mt6771 | ||
Mediatek Mt6781 | ||
Mediatek Mt6785 | ||
Mediatek Mt6833 | ||
Mediatek Mt6853 | ||
Mediatek Mt6853t | ||
Mediatek Mt6873 | ||
Mediatek Mt6877 | ||
Mediatek Mt6883 | ||
Mediatek Mt6885 | ||
Mediatek Mt6889 | ||
Mediatek Mt6893 | ||
Mediatek Mt8786 | ||
Mediatek Mt8789 | ||
Mediatek Mt8797 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-20759.
The severity of CVE-2023-20759 is medium with a CVSS score of 4.4.
Google Android versions 12.0 and 13.0 are affected by CVE-2023-20759.
No, user interaction is not needed for exploitation of CVE-2023-20759.
To fix CVE-2023-20759, it is recommended to apply the patch provided by Mediatek. Please refer to their product security bulletin for more information.