CVE-2023-32844

In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01130183 (MSV-850).
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:04

Type Values Removed Values Added
References () https://corp.mediatek.com/product-security-bulletin/December-2023 - Vendor Advisory () https://corp.mediatek.com/product-security-bulletin/December-2023 - Vendor Advisory

07 Dec 2023, 17:33

Type Values Removed Values Added
CWE CWE-617
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Mediatek mt6855
Mediatek nr15
Mediatek
Mediatek mt6813
Mediatek mt6835
Mediatek mt6980d
Mediatek mt6896
Mediatek mt6883
Mediatek mt6879
Mediatek mt6891
Mediatek mt6877
Mediatek mt6893
Mediatek mt6989
Mediatek mt6897
Mediatek mt6853
Mediatek mt6886
Mediatek mt6983
Mediatek mt6815
Mediatek mt2737
Mediatek mt6833
Mediatek mt6298
Mediatek mt6889
Mediatek mt6885
Mediatek mt6875
Mediatek nr16
Mediatek mt6890
Mediatek mt6985
Mediatek mt6895t
Mediatek mt6980
Mediatek mt6297
Mediatek nr17
Mediatek mt6875t
Mediatek mt6880
Mediatek mt6873
Mediatek mt6990
Mediatek mt2735
Mediatek mt6895
CPE cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
References () https://corp.mediatek.com/product-security-bulletin/December-2023 - () https://corp.mediatek.com/product-security-bulletin/December-2023 - Vendor Advisory

04 Dec 2023, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-04 04:15

Updated : 2024-11-21 08:04


NVD link : CVE-2023-32844

Mitre link : CVE-2023-32844

CVE.ORG link : CVE-2023-32844


JSON object : View

Products Affected

mediatek

  • mt6880
  • mt6896
  • mt6877
  • mt6985
  • mt6980
  • mt6886
  • mt6883
  • mt6853
  • mt6890
  • mt6897
  • mt6298
  • mt6889
  • mt6833
  • mt6990
  • mt6813
  • mt2737
  • mt6893
  • mt2735
  • mt6815
  • nr16
  • mt6895t
  • mt6989
  • mt6873
  • nr17
  • mt6891
  • nr15
  • mt6875t
  • mt6885
  • mt6855
  • mt6835
  • mt6875
  • mt6980d
  • mt6879
  • mt6983
  • mt6895
  • mt6297
CWE
CWE-617

Reachable Assertion