← Voltar para CVEs
CVE-2022-20083
CRITICAL9.8
Descricao
In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado7/6/2022
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
mediatek:lr11mediatek:lr12mediatek:lr12amediatek:lr13mediatek:lr9mediatek:mt2731mediatek:mt2735mediatek:mt6297mediatek:mt6725mediatek:mt6735mediatek:mt6737mediatek:mt6739mediatek:mt6750mediatek:mt6750smediatek:mt6755mediatek:mt6757mediatek:mt6757pmediatek:mt6758mediatek:mt6761mediatek:mt6762mediatek:mt6762dmediatek:mt6762mmediatek:mt6763mediatek:mt6765mediatek:mt6765tmediatek:mt6767mediatek:mt6768mediatek:mt6769mediatek:mt6769tmediatek:mt6769zmediatek:mt6771mediatek:mt6775mediatek:mt6779mediatek:mt6781mediatek:mt6783mediatek:mt6785mediatek:mt6785tmediatek:mt6789mediatek:mt6797mediatek:mt6799mediatek:mt6833mediatek:mt6853mediatek:mt6855mediatek:mt6873mediatek:mt6875mediatek:mt6877mediatek:mt6879mediatek:mt6880mediatek:mt6883mediatek:mt6885mediatek:mt6889mediatek:mt6890mediatek:mt6891mediatek:mt6893mediatek:mt6895mediatek:mt6983mediatek:mt8666mediatek:mt8667mediatek:mt8675mediatek:mt8735amediatek:mt8735bmediatek:mt8765mediatek:mt8766mediatek:mt8768mediatek:mt8771mediatek:mt8781mediatek:mt8786mediatek:mt8788mediatek:mt8789mediatek:mt8791mediatek:mt8797mediatek:nr15mediatek:nr16
Fraquezas (CWE)
CWE-787
Referencias
https://corp.mediatek.com/product-security-bulletin/July-2022(security@mediatek.com)
https://corp.mediatek.com/product-security-bulletin/July-2022(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.