First published: Mon Oct 02 2023(Updated: )
In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637.
Credit: security@mediatek.com security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Yocto | =3.1 | |
Linuxfoundation Yocto | =3.3 | |
Mediatek Iot Yocto | =23.0 | |
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Linux Linux kernel | =4.19 | |
Mediatek Mt5221 | ||
Mediatek Mt6781 | ||
Mediatek Mt6833 | ||
Mediatek Mt6853 | ||
Mediatek Mt6853t | ||
Mediatek Mt6855 | ||
Mediatek Mt6873 | ||
Mediatek Mt6875 | ||
Mediatek Mt6877 | ||
Mediatek Mt6879 | ||
Mediatek Mt6883 | ||
Mediatek Mt6885 | ||
Mediatek Mt6886 | ||
Mediatek Mt6889 | ||
Mediatek Mt6891 | ||
Mediatek Mt6893 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt6985 | ||
Mediatek Mt7663 | ||
Mediatek Mt7668 | ||
Mediatek Mt7902 | ||
Mediatek Mt7921 | ||
Mediatek Mt8168 | ||
Mediatek Mt8365 | ||
Mediatek Mt8518s | ||
Mediatek Mt8532 | ||
Mediatek Mt8666 | ||
Mediatek Mt8673 | ||
Mediatek Mt8675 | ||
Mediatek Mt8695 | ||
Mediatek Mt8766 | ||
Mediatek Mt8768 | ||
Mediatek Mt8781 | ||
Mediatek Mt8786 | ||
Mediatek Mt8789 | ||
Mediatek Mt8791 | ||
Mediatek Mt8797 | ||
Mediatek Mt8798 | ||
Google Android | ||
All of | ||
Any of | ||
Linuxfoundation Yocto | =3.1 | |
Linuxfoundation Yocto | =3.3 | |
Mediatek Iot Yocto | =23.0 | |
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Linux Linux kernel | =4.19 | |
Any of | ||
Mediatek Mt5221 | ||
Mediatek Mt6781 | ||
Mediatek Mt6833 | ||
Mediatek Mt6853 | ||
Mediatek Mt6853t | ||
Mediatek Mt6855 | ||
Mediatek Mt6873 | ||
Mediatek Mt6875 | ||
Mediatek Mt6877 | ||
Mediatek Mt6879 | ||
Mediatek Mt6883 | ||
Mediatek Mt6885 | ||
Mediatek Mt6886 | ||
Mediatek Mt6889 | ||
Mediatek Mt6891 | ||
Mediatek Mt6893 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt6985 | ||
Mediatek Mt7663 | ||
Mediatek Mt7668 | ||
Mediatek Mt7902 | ||
Mediatek Mt7921 | ||
Mediatek Mt8168 | ||
Mediatek Mt8365 | ||
Mediatek Mt8518s | ||
Mediatek Mt8532 | ||
Mediatek Mt8666 | ||
Mediatek Mt8673 | ||
Mediatek Mt8675 | ||
Mediatek Mt8695 | ||
Mediatek Mt8766 | ||
Mediatek Mt8768 | ||
Mediatek Mt8781 | ||
Mediatek Mt8786 | ||
Mediatek Mt8789 | ||
Mediatek Mt8791 | ||
Mediatek Mt8797 | ||
Mediatek Mt8798 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-32820.
CVE-2023-32820 has a severity level of 7.5 (High).
This vulnerability can be exploited remotely without any user interaction.
The affected software for CVE-2023-32820 includes Linuxfoundation Yocto 3.1 and 3.3, Mediatek Iot Yocto 23.0, and Google Android 11.0, 12.0, and 13.0.
To patch CVE-2023-32820, you can apply the patch with Patch ID ALPS07932637 and Issue ID ALPS07932637.