First published: Mon Aug 07 2023(Updated: )
In thermal, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07648734; Issue ID: ALPS07648734.
Credit: security@mediatek.com security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =12.0 | |
Mediatek Mt6739 | ||
Mediatek Mt6761 | ||
Mediatek Mt6765 | ||
Mediatek Mt6768 | ||
Mediatek Mt6771 | ||
Mediatek Mt6779 | ||
Mediatek Mt6781 | ||
Mediatek Mt6785 | ||
Mediatek Mt6833 | ||
Mediatek Mt6853 | ||
Mediatek Mt6873 | ||
Mediatek Mt6877 | ||
Mediatek Mt6883 | ||
Mediatek Mt8167 | ||
Mediatek Mt8167s | ||
Mediatek Mt8168 | ||
Mediatek Mt8321 | ||
Mediatek Mt8362a | ||
Mediatek Mt8365 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-20787.
The severity of CVE-2023-20787 is medium with a CVSS score of 6.4.
The affected software includes Google Android version 12.0.
No, user interaction is not needed for exploitation.
Yes, there is a patch available. Please refer to the reference link for more details.