cvelist/2023/32xxx/CVE-2023-32841.json

63 lines
2.3 KiB
JSON
Raw Normal View History

2023-05-16 04:00:40 +00:00
{
2023-12-04 04:00:32 +00:00
"data_version": "4.0",
2023-05-16 04:00:40 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-32841",
2023-12-04 04:00:32 +00:00
"ASSIGNER": "security@mediatek.com",
"STATE": "PUBLIC"
2023-05-16 04:00:40 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-12-04 04:00:32 +00:00
"value": "In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01128524 (MSV-846)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "MediaTek, Inc.",
"product": {
"product_data": [
{
"product_name": "MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Modem NR15, NR16, and NR17"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2023",
"refsource": "MISC",
"name": "https://corp.mediatek.com/product-security-bulletin/December-2023"
2023-05-16 04:00:40 +00:00
}
]
}
}