CWE
391 754
Advisory Published
CVE Published
Updated

CVE-2023-32871

First published: Mon May 06 2024(Updated: )

In DA, there is a possible permission bypass due to an incorrect status check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355514; Issue ID: ALPS08355514.

Credit: security@mediatek.com

Affected SoftwareAffected VersionHow to fix
Android
All of
Any of
Yocto Project=3.3
Yocto Project=4.0
RDK Central RDKB=2022q3
Android=12.0
Android=13.0
Android=14.0
Android=15.0
Open edX=19.07.0
Open edX=21.02.0
Any of
MediaTek MT2737
MediaTek MT6739
MediaTek MT6761
MediaTek MT6765
MediaTek MT6768
MediaTek MT6771
MediaTek MT6779
MediaTek MT6781
MediaTek MT6785T
MediaTek M6789
MediaTek MT6833
MediaTek MT6835
MediaTek MT6853
MediaTek MT6853T
MediaTek MT6855
MediaTek MT6873
MediaTek MT6877
MediaTek MT6879
MediaTek MT6880
MediaTek MT6883
MediaTek MT6885
MediaTek MT6886
MediaTek MT6889
MediaTek MT6890
MediaTek MT6893
MediaTek MT6895
MediaTek MT6897
MediaTek MT6980D
MediaTek MT6983
MediaTek MT6985T
MediaTek MT6989
MediaTek MT6990
MediaTek MT8167
MediaTek MT8167S Firmware
MediaTek MT8168
MediaTek MT8173
MediaTek MT8175 Firmware
MediaTek MT8185
MediaTek MT8188
MediaTek MT8195Z
MediaTek MT8321
MediaTek MT8362A Firmware
MediaTek MT8365 Firmware
MediaTek MT8385 Firmware
MediaTek MT8390
MediaTek MT8395
MediaTek MT8755
MediaTek MT8765
MediaTek MT8766Z
MediaTek MT8768
MediaTek MT8775
MediaTek MT8781 WiFi
MediaTek MT8786
MediaTek MT8788 Firmware
MediaTek MT8789
MediaTek MT8791 WiFi
MediaTek MT8791T
MediaTek MT8797 WiFi
MediaTek MT8798

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2023-32871?

    CVE-2023-32871 has been rated as a high severity vulnerability due to its potential for local escalation of privilege.

  • How do I fix CVE-2023-32871?

    To fix CVE-2023-32871, users should apply the patch identified by ALPS08355514 as issued by the vendor.

  • What type of vulnerability is CVE-2023-32871?

    CVE-2023-32871 is classified as a permission bypass vulnerability that allows local escalation of privilege.

  • Is user interaction required to exploit CVE-2023-32871?

    No, user interaction is not needed for the exploitation of CVE-2023-32871.

  • What software is affected by CVE-2023-32871?

    CVE-2023-32871 affects Google Android products.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203