mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-09 03:57:14 +00:00
Auto-Update: 2023-07-10T06:00:36.316829+00:00
This commit is contained in:
parent
61c588bf44
commit
71e793bb25
@ -2,19 +2,166 @@
|
||||
"id": "CVE-2023-20757",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.030",
|
||||
"lastModified": "2023-07-05T13:00:42.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:25:11.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In cmdq, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07636133; Issue ID: ALPS07636133."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,171 @@
|
||||
"id": "CVE-2023-20758",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.077",
|
||||
"lastModified": "2023-07-05T13:00:42.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:25:02.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In cmdq, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07636133; Issue ID: ALPS07636130."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,171 @@
|
||||
"id": "CVE-2023-20759",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.127",
|
||||
"lastModified": "2023-07-05T13:00:42.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:24:49.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In cmdq, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07636133; Issue ID: ALPS07634601."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,106 @@
|
||||
"id": "CVE-2023-20760",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.180",
|
||||
"lastModified": "2023-07-05T13:00:42.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:24:34.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In apu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629578; Issue ID: ALPS07629578."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,291 @@
|
||||
"id": "CVE-2023-20761",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.233",
|
||||
"lastModified": "2023-07-05T13:00:42.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:29:23.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628604; Issue ID: ALPS07628582."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,351 @@
|
||||
"id": "CVE-2023-20766",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.287",
|
||||
"lastModified": "2023-07-05T13:00:42.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:29:15.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573237; Issue ID: ALPS07573202."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,131 @@
|
||||
"id": "CVE-2023-20767",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.340",
|
||||
"lastModified": "2023-07-05T13:00:42.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:26:12.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In pqframework, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629585; Issue ID: ALPS07629584."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,296 @@
|
||||
"id": "CVE-2023-20768",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.383",
|
||||
"lastModified": "2023-07-05T13:00:42.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:25:56.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ion, there is a possible out of bounds read due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560720; Issue ID: ALPS07559800."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,135 @@
|
||||
"id": "CVE-2023-20771",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.423",
|
||||
"lastModified": "2023-07-05T13:00:36.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:32:11.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In display, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07671046; Issue ID: ALPS07671046."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,251 @@
|
||||
"id": "CVE-2023-20772",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.467",
|
||||
"lastModified": "2023-07-05T13:00:36.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:31:43.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441796; Issue ID: ALPS07441796."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,251 @@
|
||||
"id": "CVE-2023-20773",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.510",
|
||||
"lastModified": "2023-07-05T13:00:36.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:31:28.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07611449; Issue ID: ALPS07441735."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,136 @@
|
||||
"id": "CVE-2023-20774",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.550",
|
||||
"lastModified": "2023-07-05T13:00:36.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:31:05.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292228; Issue ID: ALPS07292228."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,271 @@
|
||||
"id": "CVE-2023-20775",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-07-04T02:15:10.590",
|
||||
"lastModified": "2023-07-05T13:00:36.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-10T02:30:23.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:21.02:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D36D1D8-C428-438F-A773-150B30A8EBFC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2023",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-372xx/CVE-2023-37286.json
Normal file
55
CVE-2023/CVE-2023-372xx/CVE-2023-37286.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-37286",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-07-10T02:15:45.237",
|
||||
"lastModified": "2023-07-10T02:15:45.237",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SmartSoft SmartBPM.NET has a vulnerability of using hard-coded machine key. An unauthenticated remote attacker can use the machine key to send serialized payload to the server to execute arbitrary code and disrupt service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7221-438c6-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-372xx/CVE-2023-37287.json
Normal file
55
CVE-2023/CVE-2023-372xx/CVE-2023-37287.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-37287",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-07-10T02:15:45.543",
|
||||
"lastModified": "2023-07-10T02:15:45.543",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SmartBPM.NET has a vulnerability of using hard-coded authentication key. An unauthenticated remote attacker can exploit this vulnerability to access system with regular user privilege to read application data, and execute submission and approval processes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7222-cdfd0-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-372xx/CVE-2023-37288.json
Normal file
55
CVE-2023/CVE-2023-372xx/CVE-2023-37288.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-37288",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-07-10T02:15:45.607",
|
||||
"lastModified": "2023-07-10T02:15:45.607",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SmartBPM.NET has a vulnerability of using hard-coded authentication key. An unauthenticated remote attacker can exploit this vulnerability to access system with regular user privilege to read application data, and execute submission and approval processes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7223-af8f8-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
52
README.md
52
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-07-08T12:00:28.035344+00:00
|
||||
2023-07-10T06:00:36.316829+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-07-08T10:25:54.183000+00:00
|
||||
2023-07-10T02:32:11.797000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,49 +23,41 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2023-07-08T00:00:13.594222+00:00
|
||||
2023-07-10T00:00:13.552837+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
219496
|
||||
219499
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2023-37286](CVE-2023/CVE-2023-372xx/CVE-2023-37286.json) (`2023-07-10T02:15:45.237`)
|
||||
* [CVE-2023-37287](CVE-2023/CVE-2023-372xx/CVE-2023-37287.json) (`2023-07-10T02:15:45.543`)
|
||||
* [CVE-2023-37288](CVE-2023/CVE-2023-372xx/CVE-2023-37288.json) (`2023-07-10T02:15:45.607`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `24`
|
||||
Recently modified CVEs: `13`
|
||||
|
||||
* [CVE-2021-33796](CVE-2021/CVE-2021-337xx/CVE-2021-33796.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2021-33798](CVE-2021/CVE-2021-337xx/CVE-2021-33798.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2021-32494](CVE-2021/CVE-2021-324xx/CVE-2021-32494.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2021-32495](CVE-2021/CVE-2021-324xx/CVE-2021-32495.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2021-39014](CVE-2021/CVE-2021-390xx/CVE-2021-39014.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2022-4361](CVE-2022/CVE-2022-43xx/CVE-2022-4361.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-36256](CVE-2023/CVE-2023-362xx/CVE-2023-36256.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-36992](CVE-2023/CVE-2023-369xx/CVE-2023-36992.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-36993](CVE-2023/CVE-2023-369xx/CVE-2023-36993.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-36994](CVE-2023/CVE-2023-369xx/CVE-2023-36994.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-20133](CVE-2023/CVE-2023-201xx/CVE-2023-20133.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-20180](CVE-2023/CVE-2023-201xx/CVE-2023-20180.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-37170](CVE-2023/CVE-2023-371xx/CVE-2023-37170.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-37171](CVE-2023/CVE-2023-371xx/CVE-2023-37171.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-37172](CVE-2023/CVE-2023-371xx/CVE-2023-37172.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-37173](CVE-2023/CVE-2023-371xx/CVE-2023-37173.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-37261](CVE-2023/CVE-2023-372xx/CVE-2023-37261.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-37262](CVE-2023/CVE-2023-372xx/CVE-2023-37262.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-37269](CVE-2023/CVE-2023-372xx/CVE-2023-37269.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-37270](CVE-2023/CVE-2023-372xx/CVE-2023-37270.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-32000](CVE-2023/CVE-2023-320xx/CVE-2023-32000.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-3551](CVE-2023/CVE-2023-35xx/CVE-2023-3551.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-3552](CVE-2023/CVE-2023-35xx/CVE-2023-3552.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-3553](CVE-2023/CVE-2023-35xx/CVE-2023-3553.json) (`2023-07-08T10:25:54.183`)
|
||||
* [CVE-2023-20760](CVE-2023/CVE-2023-207xx/CVE-2023-20760.json) (`2023-07-10T02:24:34.707`)
|
||||
* [CVE-2023-20759](CVE-2023/CVE-2023-207xx/CVE-2023-20759.json) (`2023-07-10T02:24:49.917`)
|
||||
* [CVE-2023-20758](CVE-2023/CVE-2023-207xx/CVE-2023-20758.json) (`2023-07-10T02:25:02.297`)
|
||||
* [CVE-2023-20757](CVE-2023/CVE-2023-207xx/CVE-2023-20757.json) (`2023-07-10T02:25:11.430`)
|
||||
* [CVE-2023-20768](CVE-2023/CVE-2023-207xx/CVE-2023-20768.json) (`2023-07-10T02:25:56.200`)
|
||||
* [CVE-2023-20767](CVE-2023/CVE-2023-207xx/CVE-2023-20767.json) (`2023-07-10T02:26:12.273`)
|
||||
* [CVE-2023-20766](CVE-2023/CVE-2023-207xx/CVE-2023-20766.json) (`2023-07-10T02:29:15.053`)
|
||||
* [CVE-2023-20761](CVE-2023/CVE-2023-207xx/CVE-2023-20761.json) (`2023-07-10T02:29:23.667`)
|
||||
* [CVE-2023-20775](CVE-2023/CVE-2023-207xx/CVE-2023-20775.json) (`2023-07-10T02:30:23.110`)
|
||||
* [CVE-2023-20774](CVE-2023/CVE-2023-207xx/CVE-2023-20774.json) (`2023-07-10T02:31:05.343`)
|
||||
* [CVE-2023-20773](CVE-2023/CVE-2023-207xx/CVE-2023-20773.json) (`2023-07-10T02:31:28.903`)
|
||||
* [CVE-2023-20772](CVE-2023/CVE-2023-207xx/CVE-2023-20772.json) (`2023-07-10T02:31:43.217`)
|
||||
* [CVE-2023-20771](CVE-2023/CVE-2023-207xx/CVE-2023-20771.json) (`2023-07-10T02:32:11.797`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user