In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/October-2023 | Vendor Advisory |
https://corp.mediatek.com/product-security-bulletin/October-2023 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://corp.mediatek.com/product-security-bulletin/October-2023 - Vendor Advisory |
03 Oct 2023, 01:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
References | (MISC) https://corp.mediatek.com/product-security-bulletin/October-2023 - Vendor Advisory | |
CWE | CWE-787 | |
CPE | cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5895:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5815:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9969:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5806:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5813:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9900:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5680:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5833:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5835:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5816:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5670:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9901:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:* |
|
First Time |
Mediatek mt9255
Mediatek mt9970 Mediatek mt9669 Mediatek mt9660 Mediatek mt9633 Mediatek mt9686 Mediatek Mediatek mt9650 Mediatek mt9671 Mediatek mt9269 Mediatek mt9931 Mediatek mt9216 Mediatek mt9638 Mediatek mt5816 Mediatek mt9010 Mediatek mt9215 Mediatek mt9615 Mediatek mt9900 Mediatek mt9613 Mediatek mt9020 Mediatek mt9629 Mediatek mt5813 Mediatek mt9266 Mediatek mt5895 Mediatek mt9022 Mediatek mt5835 Mediatek mt9617 Mediatek mt9675 Mediatek mt9286 Mediatek mt9222 Mediatek mt9016 Mediatek mt5599 Mediatek mt9653 Mediatek mt5527 Mediatek mt9221 Mediatek mt9610 Mediatek mt5833 Mediatek mt9666 Mediatek mt9667 Google android Mediatek mt9981 Mediatek mt9612 Mediatek mt5691 Mediatek mt5695 Mediatek mt5598 Mediatek mt5583 Mediatek mt9688 Mediatek mt9950 Mediatek mt9969 Mediatek mt9011 Mediatek mt9670 Mediatek mt9630 Mediatek mt5670 Mediatek mt9631 Mediatek mt5815 Mediatek mt9685 Mediatek mt9649 Mediatek mt9679 Mediatek mt9600 Mediatek mt9636 Mediatek mt9652 Mediatek mt9021 Mediatek mt5806 Mediatek mt9632 Mediatek mt9012 Mediatek mt9980 Mediatek mt9901 Mediatek mt9639 Mediatek mt9602 Mediatek mt9256 Mediatek mt5680 Mediatek mt9285 |
02 Oct 2023, 03:53
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-02 03:15
Updated : 2024-11-21 08:04
NVD link : CVE-2023-32830
Mitre link : CVE-2023-32830
CVE.ORG link : CVE-2023-32830
JSON object : View
Products Affected
mediatek
- mt9970
- mt9653
- mt9216
- mt9600
- mt5815
- mt9016
- mt9649
- mt9685
- mt5583
- mt5527
- mt9255
- mt9631
- mt5598
- mt9022
- mt9021
- mt9215
- mt9671
- mt9638
- mt9615
- mt9660
- mt9011
- mt9269
- mt9630
- mt9652
- mt9602
- mt9629
- mt9667
- mt9686
- mt9679
- mt9612
- mt9950
- mt9969
- mt5691
- mt5813
- mt9266
- mt9613
- mt9670
- mt9636
- mt5895
- mt9020
- mt9617
- mt9675
- mt9980
- mt9632
- mt5670
- mt9639
- mt9650
- mt9285
- mt9688
- mt9256
- mt9931
- mt5816
- mt9222
- mt9286
- mt9901
- mt5695
- mt9221
- mt9981
- mt5680
- mt5833
- mt9633
- mt5599
- mt9900
- mt5835
- mt5806
- mt9010
- mt9610
- mt9669
- mt9012
- mt9666
- android
CWE
CWE-787
Out-of-bounds Write