CVE-2023-20677

In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588436.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:3.1:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:3.3:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:4.0:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8169:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:41

Type Values Removed Values Added
References () https://corp.mediatek.com/product-security-bulletin/April-2023 - Vendor Advisory () https://corp.mediatek.com/product-security-bulletin/April-2023 - Vendor Advisory

12 Apr 2023, 19:41

Type Values Removed Values Added
First Time Yoctoproject
Google android
Mediatek mt8695
Mediatek mt8791t
Mediatek mt6983
Mediatek mt6833
Mediatek mt6895
Mediatek mt8789
Mediatek mt8167s
Mediatek mt8518
Mediatek mt6781
Mediatek mt8385
Mediatek mt8766
Mediatek mt6877
Mediatek mt8788
Mediatek mt8786
Mediatek mt8169
Google
Mediatek mt5221
Mediatek mt7902
Linux
Mediatek mt7668
Mediatek mt6789
Mediatek mt6855
Mediatek mt6879
Yoctoproject yocto
Mediatek mt8362a
Mediatek mt8185
Mediatek mt8798
Mediatek mt8781
Mediatek mt8768
Mediatek mt8675
Mediatek mt8168
Mediatek mt8797
Mediatek mt8365
Mediatek mt8175
Mediatek mt7663
Mediatek mt8532
Mediatek mt8771
Mediatek mt7921
Linux linux Kernel
Mediatek
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.4
CWE CWE-125
CPE cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:3.1:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:3.3:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8169:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*
References (MISC) https://corp.mediatek.com/product-security-bulletin/April-2023 - (MISC) https://corp.mediatek.com/product-security-bulletin/April-2023 - Vendor Advisory

06 Apr 2023, 19:50

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-06 18:15

Updated : 2024-11-21 07:41


NVD link : CVE-2023-20677

Mitre link : CVE-2023-20677

CVE.ORG link : CVE-2023-20677


JSON object : View

Products Affected

mediatek

  • mt7668
  • mt6855
  • mt6877
  • mt8771
  • mt8797
  • mt6895
  • mt8518
  • mt8788
  • mt6781
  • mt8168
  • mt8791t
  • mt8365
  • mt8532
  • mt8362a
  • mt6833
  • mt6983
  • mt8167s
  • mt8675
  • mt8798
  • mt7921
  • mt6879
  • mt8185
  • mt7663
  • mt5221
  • mt7902
  • mt6789
  • mt8175
  • mt8695
  • mt8768
  • mt8789
  • mt8385
  • mt8766
  • mt8169
  • mt8781
  • mt8786

google

  • android

yoctoproject

  • yocto

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read