2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-32659" ,
"sourceIdentifier" : "security@mediatek.com" ,
"published" : "2023-01-03T21:15:12.603" ,
2024-04-04 08:46:00 +00:00
"lastModified" : "2023-08-08T14:22:24.967" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705066; Issue ID: GN20220705066."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el controlador de Wi-Fi, existe un posible comportamiento indefinido debido a un manejo incorrecto de errores. Esto podr\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\u00f3n del sistema necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: GN20220705066; ID del problema: GN20220705066."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 6.7 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 0.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
2024-04-04 08:46:00 +00:00
"value" : "CWE-755"
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt7603_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE7D50BA-4588-406B-9873-EB067B1FADC0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A45CDA9-95E6-4C02-8C3C-3B0CF7272A6F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt7613_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B89C8667-CFE2-4C1D-904A-20E63D6CAD63"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4979BA07-DC09-4DF8-BA7F-E4143A0ECFE6"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt7615_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "188DCE87-D893-4109-B946-5A943723021E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "05748BB1-0D48-4097-932E-E8E2E574FD8D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt7622_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "556F893B-9EB4-4795-B8F0-BCDCDE7F9981"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "55EB4B27-6264-45BE-9A22-BE8418BB0C06"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt7628_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1144B15B-0F33-4622-9534-D22741EA6C4A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7476AF58-342B-4E2A-BEAD-E379097148D2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt7629_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "572E4322-E017-4298-B34D-F54CB43E599F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "29C210A3-C71E-4010-9DD6-9E36CADC9EED"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt7915_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "303A9DA7-2C6C-434A-85E7-EE200AF9E2DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3AB22996-9C22-4B6C-9E94-E4C055D16335"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt7916_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "14734451-2D61-4EB5-8BB2-414E2BEDC534"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD5AA441-5381-4179-89EB-1642120F72B4"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt7981_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "81B46566-AE03-4B6B-8B25-13621A060156"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "490CD97B-021F-4350-AEE7-A2FA866D5889"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt7986_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72A30F15-0654-4479-8944-6AF67F610AF3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "40A9E917-4B34-403F-B512-09EEBEA46811"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt8518s_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E11B4BFA-5424-47ED-B7C9-FBFF62E200ED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6069CD03-6AB1-4A06-88CF-EFBDEA84CDE2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mediatek:mt8532_firmware:7.6.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "60521D31-F322-4740-9F8F-F16D76902BBC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "165C6E7B-6487-4BBB-B090-7A33FE537226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:thelinuxfoundation:yocto:3.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F050E461-8A68-4451-AC03-182E38FE7883"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://corp.mediatek.com/product-security-bulletin/January-2023" ,
"source" : "security@mediatek.com" ,
"tags" : [
"Vendor Advisory"
]
}
]
}