In Wi-Fi, there is a possible low throughput due to misrepresentation of critical information. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220829014; Issue ID: GN20220829014.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/July-2023 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
History
07 Jul 2023, 21:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7628_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt8365_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7916_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7622_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7981_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7629_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7986_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7615_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7613_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7603_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7915_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:* |
|
References | (MISC) https://corp.mediatek.com/product-security-bulletin/July-2023 - Vendor Advisory | |
First Time |
Mediatek mt7603
Mediatek mt7622 Firmware Mediatek mt7986 Firmware Linuxfoundation yocto Mediatek mt7615 Firmware Mediatek mt7981 Mediatek Mediatek mt7629 Mediatek mt7628 Firmware Mediatek mt7603 Firmware Mediatek mt7628 Mediatek mt8365 Firmware Mediatek mt7981 Firmware Mediatek mt7915 Firmware Mediatek mt7916 Firmware Mediatek mt7615 Mediatek mt7916 Mediatek mt8365 Mediatek mt7986 Mediatek mt7613 Mediatek mt7629 Firmware Mediatek mt7622 Linuxfoundation Mediatek mt7915 Mediatek mt7613 Firmware |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | NVD-CWE-Other |
04 Jul 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-04 02:15
Updated : 2024-02-28 20:13
NVD link : CVE-2022-32666
Mitre link : CVE-2022-32666
CVE.ORG link : CVE-2022-32666
JSON object : View
Products Affected
mediatek
- mt7986
- mt7629_firmware
- mt7603_firmware
- mt7628_firmware
- mt7603
- mt7916_firmware
- mt7915_firmware
- mt8365
- mt7981
- mt7629
- mt7986_firmware
- mt7628
- mt7615
- mt7916
- mt7915
- mt8365_firmware
- mt7615_firmware
- mt7981_firmware
- mt7613
- mt7613_firmware
- mt7622_firmware
- mt7622
linuxfoundation
- yocto
CWE