In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/August-2023 | Vendor Advisory |
https://corp.mediatek.com/product-security-bulletin/August-2023 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://corp.mediatek.com/product-security-bulletin/August-2023 - Vendor Advisory |
09 Aug 2023, 17:51
Type | Values Removed | Values Added |
---|---|---|
First Time |
Mediatek mt9266
Mediatek mt9222 Mediatek mt9255 Mediatek mt9610 Mediatek mt9632 Mediatek mt9630 Mediatek mt9011 Mediatek mt5691 Mediatek mt9615 Mediatek mt9021 Linux Mediatek Mediatek mt9286 Google android Mediatek mt9649 Mediatek mt9256 Mediatek mt9612 Mediatek mt9636 Mediatek mt9669 Mediatek mt9269 Mediatek mt9032 Mediatek mt9631 Mediatek mt9220 Mediatek mt5695 Mediatek mt9022 Mediatek mt9617 Mediatek mt9667 Mediatek mt9221 Mediatek mt9216 Mediatek mt9629 Mediatek mt9218 Mediatek mt9016 Mediatek mt9652 Mediatek mt9675 Mediatek mt9602 Mediatek mt9686 Mediatek mt9666 Mediatek mt9650 Mediatek mt5583 Mediatek mt9613 Mediatek mt9288 Mediatek mt9671 Mediatek mt9030 Mediatek mt9638 Mediatek mt9653 Mediatek mt9031 Linux linux Kernel Mediatek mt9685 Mediatek mt9010 Mediatek mt5221 Mediatek mt9618 Mediatek mt9012 Mediatek mt9020 Mediatek mt9611 Mediatek mt9688 Mediatek mt9639 |
|
CPE | cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
CWE | NVD-CWE-noinfo | |
References | (MISC) https://corp.mediatek.com/product-security-bulletin/August-2023 - Vendor Advisory |
07 Aug 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-07 04:15
Updated : 2024-11-21 07:41
NVD link : CVE-2023-20810
Mitre link : CVE-2023-20810
CVE.ORG link : CVE-2023-20810
JSON object : View
Products Affected
mediatek
- mt9653
- mt9216
- mt9649
- mt9016
- mt9685
- mt5583
- mt9255
- mt9631
- mt9022
- mt9021
- mt9671
- mt9638
- mt9615
- mt9011
- mt9269
- mt9630
- mt9618
- mt9602
- mt9629
- mt9652
- mt9667
- mt9611
- mt9612
- mt9686
- mt9030
- mt5691
- mt9266
- mt9613
- mt9031
- mt9636
- mt9020
- mt5221
- mt9617
- mt9675
- mt9632
- mt9218
- mt9639
- mt9650
- mt9688
- mt9256
- mt9288
- mt9222
- mt9286
- mt5695
- mt9221
- mt9032
- mt9010
- mt9220
- mt9610
- mt9669
- mt9012
- mt9666
- android
linux
- linux_kernel
CWE