First published: Mon Dec 04 2023(Updated: )
In aee, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07909204; Issue ID: ALPS07909204.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Yocto Project | =2.6 | |
Yocto Project | =3.3 | |
Yocto Project | =4.0 | |
RDK Central RDKB | =2022q3 | |
Android | =12.0 | |
Android | =13.0 | |
Open edX | =19.07.0 | |
Open edX | =21.02 | |
Any of | ||
MediaTek MT2735 | ||
MediaTek MT2737 | ||
MediaTek MT6765 | ||
MediaTek MT6768 | ||
MediaTek MT6769 | ||
MediaTek MT6833 | ||
MediaTek MT6835 | ||
MediaTek MT6853 | ||
MediaTek MT6853T | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6875T | ||
MediaTek MT6877 | ||
MediaTek MT6879 | ||
MediaTek MT6880 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6890 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6980D | ||
MediaTek MT6983 | ||
MediaTek MT6985T | ||
MediaTek MT6990 | ||
MediaTek MT8667 | ||
MediaTek MT8765 | ||
MediaTek MT8768 | ||
MediaTek MT8786 | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8791T | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8798 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32855 is a vulnerability in aee that allows for escalation of privilege due to a missing permission check.
CVE-2023-32855 has a severity score of 6.7 out of 10, which is considered medium severity.
CVE-2023-32855 affects the following software versions: Linuxfoundation Yocto 2.6, Linuxfoundation Yocto 3.3, Linuxfoundation Yocto 4.0, Rdkcentral Rdk-b 2022q3, Google Android 12.0, Google Android 13.0, Openwrt Openwrt 19.07.0, Openwrt Openwrt 21.02.
No, user interaction is not needed for exploitation of CVE-2023-32855.
To fix CVE-2023-32855, apply the provided patch with Patch ID ALPS07909204 or update to a non-vulnerable version.