First published: Mon Oct 02 2023(Updated: )
In rpmb , there is a possible double free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07912966; Issue ID: ALPS07912961.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =12.0 | |
Android | =13.0 | |
Mediatek MT6580 | ||
MediaTek MT6739 | ||
MediaTek MT6761 | ||
MediaTek MT6762M | ||
MediaTek MT6765 | ||
MediaTek MT6768 | ||
MediaTek MT6769 | ||
MediaTek MT6779 | ||
MediaTek MT6781 | ||
MediaTek MT6785T | ||
MediaTek M6789 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6853T | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6875T | ||
MediaTek MT6877 | ||
MediaTek MT6879 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6891 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT6985T | ||
MediaTek MT8666 | ||
MediaTek MT8765 | ||
MediaTek MT8788 Firmware | ||
All of | ||
Any of | ||
Android | =12.0 | |
Android | =13.0 | |
Any of | ||
Mediatek MT6580 | ||
MediaTek MT6739 | ||
MediaTek MT6761 | ||
MediaTek MT6762M | ||
MediaTek MT6765 | ||
MediaTek MT6768 | ||
MediaTek MT6769 | ||
MediaTek MT6779 | ||
MediaTek MT6781 | ||
MediaTek MT6785T | ||
MediaTek M6789 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6853T | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6875T | ||
MediaTek MT6877 | ||
MediaTek MT6879 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6891 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT6985T | ||
MediaTek MT8666 | ||
MediaTek MT8765 | ||
MediaTek MT8788 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-32824.
The severity of CVE-2023-32824 is medium with a CVSS score of 6.7.
This vulnerability can be exploited locally without user interaction.
No, user interaction is not needed for exploitation.
Yes, a patch is available for CVE-2023-32824. Please refer to the provided reference for more information.