First published: Mon Sep 04 2023(Updated: )
In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588360; Issue ID: ALPS07588360.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Yocto Project | =4.0 | |
MediaTek IoT Yocto | =23.0 | |
Android | =13.0 | |
MediaTek MT6779 | ||
MediaTek MT6781 | ||
MediaTek MT6785T | ||
MediaTek M6789 | ||
MediaTek MT6833 | ||
MediaTek MT6835 | ||
MediaTek MT6853 | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT8167 | ||
MediaTek MT8168 | ||
MediaTek MT8173 | ||
MediaTek MT8183 | ||
MediaTek MT8321 | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8385 Firmware | ||
MediaTek MT8666 | ||
MediaTek MT8667 | ||
MediaTek MT8765 | ||
MediaTek MT8766Z | ||
MediaTek MT8768 | ||
MediaTek MT8781 WiFi | ||
MediaTek MT8786 | ||
MediaTek MT8788 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-32807.
The severity of CVE-2023-32807 is medium with a CVSS score of 4.4.
The Linuxfoundation Yocto, Mediatek Iot Yocto, and Google Android software are affected by CVE-2023-32807.
CVE-2023-32807 can be exploited without user interaction and requires local execution privileges.
Yes, a patch is available. Patch ID: ALPS07588360; Issue ID: ALPS07588360.