mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
41 lines
1.5 KiB
JSON
41 lines
1.5 KiB
JSON
{
|
|
"id": "CVE-2023-32871",
|
|
"sourceIdentifier": "security@mediatek.com",
|
|
"published": "2024-05-06T03:15:09.273",
|
|
"lastModified": "2024-11-21T08:04:14.430",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In DA, there is a possible permission bypass due to an incorrect status check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355514; Issue ID: ALPS08355514."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En DA, existe una posible omisi\u00f3n de permiso debido a una verificaci\u00f3n de estado incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08355514; ID del problema: ALPS08355514."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security@mediatek.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-391"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://corp.mediatek.com/product-security-bulletin/May-2024",
|
|
"source": "security@mediatek.com"
|
|
},
|
|
{
|
|
"url": "https://corp.mediatek.com/product-security-bulletin/May-2024",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |