CVE-2023-20810

In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:41

Type Values Removed Values Added
References () https://corp.mediatek.com/product-security-bulletin/August-2023 - Vendor Advisory () https://corp.mediatek.com/product-security-bulletin/August-2023 - Vendor Advisory

09 Aug 2023, 17:51

Type Values Removed Values Added
First Time Mediatek mt9266
Mediatek mt9222
Mediatek mt9255
Mediatek mt9610
Mediatek mt9632
Mediatek mt9630
Mediatek mt9011
Mediatek mt5691
Mediatek mt9615
Mediatek mt9021
Linux
Mediatek
Mediatek mt9286
Google android
Mediatek mt9649
Google
Mediatek mt9256
Mediatek mt9612
Mediatek mt9636
Mediatek mt9669
Mediatek mt9269
Mediatek mt9032
Mediatek mt9631
Mediatek mt9220
Mediatek mt5695
Mediatek mt9022
Mediatek mt9617
Mediatek mt9667
Mediatek mt9221
Mediatek mt9216
Mediatek mt9629
Mediatek mt9218
Mediatek mt9016
Mediatek mt9652
Mediatek mt9675
Mediatek mt9602
Mediatek mt9686
Mediatek mt9666
Mediatek mt9650
Mediatek mt5583
Mediatek mt9613
Mediatek mt9288
Mediatek mt9671
Mediatek mt9030
Mediatek mt9638
Mediatek mt9653
Mediatek mt9031
Linux linux Kernel
Mediatek mt9685
Mediatek mt9010
Mediatek mt5221
Mediatek mt9618
Mediatek mt9012
Mediatek mt9020
Mediatek mt9611
Mediatek mt9688
Mediatek mt9639
CPE cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.4
CWE NVD-CWE-noinfo
References (MISC) https://corp.mediatek.com/product-security-bulletin/August-2023 - (MISC) https://corp.mediatek.com/product-security-bulletin/August-2023 - Vendor Advisory

07 Aug 2023, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-07 04:15

Updated : 2024-11-21 07:41


NVD link : CVE-2023-20810

Mitre link : CVE-2023-20810

CVE.ORG link : CVE-2023-20810


JSON object : View

Products Affected

mediatek

  • mt9653
  • mt9216
  • mt9649
  • mt9016
  • mt9685
  • mt5583
  • mt9255
  • mt9631
  • mt9022
  • mt9021
  • mt9671
  • mt9638
  • mt9615
  • mt9011
  • mt9269
  • mt9630
  • mt9618
  • mt9602
  • mt9629
  • mt9652
  • mt9667
  • mt9611
  • mt9612
  • mt9686
  • mt9030
  • mt5691
  • mt9266
  • mt9613
  • mt9031
  • mt9636
  • mt9020
  • mt5221
  • mt9617
  • mt9675
  • mt9632
  • mt9218
  • mt9639
  • mt9650
  • mt9688
  • mt9256
  • mt9288
  • mt9222
  • mt9286
  • mt5695
  • mt9221
  • mt9032
  • mt9010
  • mt9220
  • mt9610
  • mt9669
  • mt9012
  • mt9666

google

  • android

linux

  • linux_kernel