First published: Mon Oct 02 2023(Updated: )
In video, there is a possible out of bounds write due to a permissions bypass. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08013430; Issue ID: ALPS08013433.
Credit: security@mediatek.com security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek Mt6761 | ||
Mediatek Mt6763 | ||
Mediatek Mt6765 | ||
Mediatek Mt6768 | ||
Google Android | ||
Mediatek Mt6779 | ||
Google Android | ||
Mediatek Mt6853 | ||
Mediatek Mt6873 | ||
Google Android | ||
Mediatek Mt6771 | ||
Mediatek Mt6785 | ||
Mediatek Mt6885 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-32821 is medium with a CVSS score of 6.7.
CVE-2023-32821 affects Android versions 12.0 and 13.0.
The patch ID for CVE-2023-32821 is ALPS08013430.
No, user interaction is not needed for exploitation of CVE-2023-32821.
To fix CVE-2023-32821, users should apply the patch ALPS08013430 provided by the vendor.