cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-20033,https://securityvulnerability.io/vulnerability/CVE-2024-20033,Possible Information Disclosure in NVRAM Due to Missing Bounds Check,"In nvram, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08499945; Issue ID: ALPS08499945.",MediaTek,"Mt2713, Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6785, Mt6789, Mt6835, Mt6855, Mt6879, Mt6883, Mt6885, Mt6886, Mt6893, Mt6895, Mt6983, Mt6985, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8370, Mt8385, Mt8390, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8676, Mt8678, Mt8755, Mt8765, Mt8766, Mt8768, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8792, Mt8796, Mt8797, Mt8798",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-04T02:43:48.493Z,0 CVE-2024-20025,https://securityvulnerability.io/vulnerability/CVE-2024-20025,Out of Bounds Write Vulnerability in MediaTek Products,"A potential out of bounds write issue has been identified in MediaTek software due to an integer overflow. This vulnerability could allow local escalation of privileges, enabling an attacker to execute system-level commands without user interaction. It is crucial for users of affected MediaTek devices to apply the necessary patches to mitigate this risk.",MediaTek,"Mt6739, Mt6757, Mt6761, Mt6763, Mt6765, Mt6768, Mt6771, Mt6779, Mt6785, Mt6833, Mt6853, Mt6873, Mt6877, Mt6885, Mt6893, Mt8167, Mt8168, Mt8173, Mt8175, Mt8185, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8673, Mt8678, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8796, Mt8797, Mt8798",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-04T02:43:35.600Z,0 CVE-2023-32883,https://securityvulnerability.io/vulnerability/CVE-2023-32883,Out of Bounds Write Vulnerability in MediaTek Engineer Mode,"In MediaTek's Engineer Mode, an out of bounds write vulnerability has been identified due to a missing bounds check. This flaw allows for local escalation of privileges, potentially granting malicious entities access to system execution privileges. Importantly, this vulnerability does not require user interaction for exploitation, making it a significant security concern. MediaTek has released a patch identified as ALPS08282249 to address this issue. It is crucial for users of affected MediaTek products to apply the latest updates to mitigate potential risks associated with this vulnerability.",MediaTek,"MT2713, MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-01-02T03:15:00.000Z,0 CVE-2023-32884,https://securityvulnerability.io/vulnerability/CVE-2023-32884,Information Disclosure Vulnerability in MediaTek NetDagent,"A vulnerability exists in MediaTek's NetDagent due to improper bounds checking, leading to possible information disclosure. This issue may allow an attacker to escalate privileges locally with System execution rights. Exploitation of this vulnerability does not require user interaction, thus posing a significant threat to system integrity and user data. Affected versions have been patched under Patch ID ALPS07944011 to address this security concern.",MediaTek,"MT2713, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8188, MT8192, MT8195, MT8195Z, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8696, MT8755, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8871",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-01-02T03:15:00.000Z,0 CVE-2023-20790,https://securityvulnerability.io/vulnerability/CVE-2023-20790,Out of Bounds Write Vulnerability in NVRAM by MediaTek,"A potential out of bounds write vulnerability exists in the NVRAM component of MediaTek products. This flaw arises from a missing bounds check, which can lead to local information disclosure, necessitating system execution privileges for exploitation. Notably, user interaction is not required for the attack, allowing it to be executed without prior consent from the user. A patch has been issued to address this vulnerability, emphasizing the importance of maintaining updated software to safeguard against potential exploits.",MediaTek,"Mt2713, Mt2735, Mt2737, Mt6739, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6835, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6880, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6980, Mt6983, Mt6985, Mt6990, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-08-07T04:15:00.000Z,0 CVE-2023-20690,https://securityvulnerability.io/vulnerability/CVE-2023-20690,Integer Overflow Vulnerability in MediaTek WLAN Firmware,"A vulnerability has been identified in the WLAN firmware provided by MediaTek, which occurs due to an integer overflow. This flaw may allow an attacker to exploit the system remotely, resulting in a denial of service without requiring any user interaction or special execution privileges. Affected users should update to the patched version identified by Patch ID ALPS07664735 to mitigate the risk.",MediaTek,"Mt6739, Mt8167, Mt8168, Mt8321, Mt8365, Mt8385, Mt8666, Mt8765, Mt8788",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2023-07-04T02:15:00.000Z,0 CVE-2023-20766,https://securityvulnerability.io/vulnerability/CVE-2023-20766,Out of Bounds Write Vulnerability in MediaTek GPS,"A potential vulnerability exists in MediaTek's GPS component due to insufficient bounds checking, allowing for out of bounds write conditions. This vulnerability could be exploited to escalate privileges locally to system execution levels without requiring user interaction. It is crucial for users of affected devices to apply the provided patches to mitigate this risk.",MediaTek,"Mt6580, Mt6735, Mt6739, Mt6753, Mt6757, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6886, Mt6891, Mt6893, Mt6895, Mt6983, Mt6985, Mt8167, Mt8168, Mt8173, Mt8175, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-07-04T02:15:00.000Z,0 CVE-2023-20692,https://securityvulnerability.io/vulnerability/CVE-2023-20692,Denial of Service Vulnerability in Mediatek WLAN Firmware,"A vulnerability exists in Mediatek's WLAN firmware that may cause a system crash due to an uncaught exception. This flaw allows for a potential remote denial of service attack without requiring additional execution privileges or user interaction, thus posing a significant risk to devices using the affected firmware. Timely patching is advised to mitigate this risk.",MediaTek,"Mt6739, Mt8167, Mt8168, Mt8321, Mt8365, Mt8385, Mt8666, Mt8765, Mt8788",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2023-07-04T02:15:00.000Z,0 CVE-2023-20693,https://securityvulnerability.io/vulnerability/CVE-2023-20693,Remote Denial of Service Vulnerability in MediaTek WLAN Firmware,"A vulnerability exists in MediaTek's WLAN firmware that may cause a system crash due to an uncaught exception, leading to a potential remote denial of service. This issue can be exploited without requiring any user interaction, making it a significant concern for affected users. Affected systems might experience downtime or instability, impacting network operations significantly. Users are advised to apply the available patches to mitigate this vulnerability.",MediaTek,"Mt6739, Mt6895, Mt6983, Mt8167, Mt8168, Mt8195, Mt8321, Mt8365, Mt8385, Mt8666, Mt8765, Mt8781, Mt8788",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2023-07-04T02:15:00.000Z,0 CVE-2023-20726,https://securityvulnerability.io/vulnerability/CVE-2023-20726,Location Disclosure Vulnerability in mnld from MediaTek,"A security flaw in the mnld component of MediaTek products allows for potential leaks of GPS location data. This vulnerability arises from a lack of necessary permission checks, making it possible for unauthorized access to sensitive location information without any execution privileges or user interaction. The issue specifically affects several MediaTek chipsets, underscoring the need for users and developers to ensure timely updates and patches. MediaTek has addressed this vulnerability with specific patch IDs ensuring the protection of affected MT6880, MT6890, MT6980, MT6980D, and MT6990 devices.",MediaTek,"Mt2731, Mt2735, Mt2737, Mt6580, Mt6739, Mt6761, Mt6762, Mt6765, Mt6767, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6783, Mt6785, Mt6789, Mt6833, Mt6853, Mt6855, Mt6873, Mt6877, Mt6879, Mt6880, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6896, Mt6980, Mt6980d, Mt6983, Mt6985, Mt6990, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",3.3,LOW,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-05-15T00:00:00.000Z,0 CVE-2023-20688,https://securityvulnerability.io/vulnerability/CVE-2023-20688,Out of Bounds Read Vulnerability in MediaTek Products,"This vulnerability involves a possible out of bounds read due to a missing bounds check in certain MediaTek products. If exploited, it may allow local information disclosure while requiring system execution privileges. Notably, user interaction is not necessary for this exploitation to occur. Affected products should be patched as per Patch ID: ALPS07441821 to mitigate potential risks.",MediaTek,"Mt2715, Mt6580, Mt6731, Mt6735, Mt6737, Mt6739, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8168, Mt8169, Mt8173, Mt8175, Mt8183, Mt8185, Mt8188, Mt8192, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8390, Mt8395, Mt8666, Mt8673, Mt8675, Mt8696, Mt8765, Mt8766, Mt8768, Mt8771, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8891",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-04-06T00:00:00.000Z,0 CVE-2023-20655,https://securityvulnerability.io/vulnerability/CVE-2023-20655,Privilege Escalation Vulnerability in MediaTek mmsdk Product,"A vulnerability exists in the MediaTek mmsdk due to a parcel format mismatch, which might allow local code execution without requiring additional execution privileges or user interaction. This flaw can be exploited by attackers to gain unauthorized access to system resources, posing a significant security risk. Users of affected versions are advised to apply the recommended patches promptly to safeguard their systems.",MediaTek,"MT2715, MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8192, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8871, MT8891",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-04-06T00:00:00.000Z,0 CVE-2022-32640,https://securityvulnerability.io/vulnerability/CVE-2022-32640,Out of Bounds Write Vulnerability in MediaTek Wi-Fi Products,"An out of bounds write vulnerability exists in MediaTek's Meta Wi-Fi products due to the lack of a proper bounds check. This flaw allows attackers to potentially escalate local privileges to execute system-level commands, making it a serious concern for users. The exploitation of this vulnerability does not require user interaction, thus increasing its risk profile. Affected parties are encouraged to apply the security patch provided in ALPS07441652 to secure their systems.",MediaTek,"Mt6580, Mt6731, Mt6735, Mt6737, Mt6739, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-01-03T00:00:00.000Z,0 CVE-2022-32635,https://securityvulnerability.io/vulnerability/CVE-2022-32635,Out of Bounds Write Vulnerability in MediaTek GPS Services,"A vulnerability exists in MediaTek's GPS services which allows for a possible out of bounds write due to a missing bounds check. This flaw could enable local escalation of privilege without the need for additional execution privileges, and does not require user interaction to exploit. Users and administrators are encouraged to apply the available patches to mitigate this issue.",MediaTek,"Mt6580, Mt6735, Mt6739, Mt6753, Mt6757, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-01-03T00:00:00.000Z,0 CVE-2022-32641,https://securityvulnerability.io/vulnerability/CVE-2022-32641,Out of Bounds Read Vulnerability in MediaTek Meta Wi-Fi Platform,"A vulnerability exists in MediaTek's Meta Wi-Fi platform that allows for an out of bounds read due to a lack of proper bounds checking. This flaw can lead to local escalation of privileges, enabling attackers to achieve system-level execution without requiring user interaction. It is essential to apply the necessary patches to safeguard against potential exploitation.",MediaTek,"Mt6580, Mt6731, Mt6735, Mt6737, Mt6739, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-01-03T00:00:00.000Z,0 CVE-2022-26469,https://securityvulnerability.io/vulnerability/CVE-2022-26469,Privilege Escalation Vulnerability in MtkEmail by MediaTek,A vulnerability in MtkEmail allows for privilege escalation due to fragment injection. This could result in unauthorized access to local system functions without the need for additional execution privileges or user interaction. Affected users could potentially experience unauthorized changes and actions executed at their privilege level. A patch has been released to address this issue.,MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6855, Mt6873, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6895, Mt6983, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-09-06T17:19:08.000Z,0 CVE-2022-26468,https://securityvulnerability.io/vulnerability/CVE-2022-26468,Out of Bounds Write Vulnerability in MediaTek Preloader USB,"The MediaTek Preloader USB is susceptible to an out of bounds write vulnerability due to a missing bounds check. This issue could permit a local attacker, with physical access to the device, to escalate privileges without needing additional execution permissions. Exploitation of this vulnerability requires user interaction, making it crucial for individuals and organizations using MediaTek products to be aware and apply necessary patches.",MediaTek,"Mt6735, Mt6739, Mt6761, Mt6763, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6855, Mt6873, Mt6877, Mt6879, Mt6885, Mt6893, Mt6895, Mt6983, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8735a, Mt8735b, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8797",6.6,MEDIUM,0.0004799999878741801,false,,false,false,false,,,false,false,,2022-09-06T17:19:08.000Z,0 CVE-2022-21777,https://securityvulnerability.io/vulnerability/CVE-2022-21777,Permission Bypass in Autoboot Affects MediaTek Products,"A vulnerability exists in MediaTek's Autoboot that may allow unauthorized users to bypass permission checks, leading to local escalation of privilege. This issue arises from a lack of adequate permission verification within the software, which can be exploited without requiring additional execution privileges or user interaction. It is critical for users to apply the necessary patches to mitigate this vulnerability and protect their systems.",MediaTek,"Mt6580, Mt6735, Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6785, Mt6833, Mt6853, Mt6873, Mt6875, Mt6877, Mt6879, Mt6885, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-07-06T13:07:31.000Z,0 CVE-2022-21776,https://securityvulnerability.io/vulnerability/CVE-2022-21776,Local Privilege Escalation Vulnerability in MediaTek's MDP Software,"The vulnerability in MediaTek's MDP software arises from a use-after-free condition caused by a race condition. This flaw may allow an attacker to escalate privileges on the affected system, enabling them to execute commands with system-level permissions. Exploitation of this vulnerability does not require user interaction, making it a significant risk to system integrity. A patch has been released to address this issue, ensuring that affected users are encouraged to update to the latest version.",MediaTek,"Mt6580, Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6873, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6893, Mt6895, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8791, Mt8797, Mt8798",6.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-07-06T13:07:25.000Z,0 CVE-2022-21759,https://securityvulnerability.io/vulnerability/CVE-2022-21759,Out of Bounds Write Vulnerability in MediaTek Power Service,"A vulnerability has been identified within MediaTek's Power Service that allows an out of bounds write due to a missing bounds check. This issue could be exploited to achieve local escalation of privileges, granting an attacker system execution capabilities without the need for user interaction. It is crucial for users of the affected products to apply remediation steps provided in the official security bulletin to mitigate the risks associated with this vulnerability.",MediaTek,"Mt6580, Mt6735, Mt6739, Mt6761, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6873, Mt6875, Mt6877, Mt6879, Mt6885, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-06-06T17:40:26.000Z,0 CVE-2022-21743,https://securityvulnerability.io/vulnerability/CVE-2022-21743,Integer Overflow Vulnerability in MediaTek Ion Product,"The MediaTek Ion product is impacted by an integer overflow vulnerability that may lead to a use after free scenario. This issue allows an attacker to escalate privileges locally without requiring additional execution rights. Notably, user interaction is not necessary for exploitation, making the threat more significant. A patch has been released to mitigate this vulnerability, underscoring the importance of timely updates to protect affected devices.",MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6750, Mt6750s, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6797, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6883, Mt6885, Mt6889, Mt6893, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2022-05-03T20:06:47.000Z,0 CVE-2022-20111,https://securityvulnerability.io/vulnerability/CVE-2022-20111,Local Privilege Escalation in Ion by MediaTek,"The vulnerability in Ion by MediaTek arises from a use after free issue, primarily due to improper error handling. This flaw enables an attacker to execute local privilege escalation without requiring additional execution privileges or user interaction, creating a significant security risk. Affected systems should implement the recommended patches to mitigate the potential impact of this vulnerability.",MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6750, Mt6750s, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6797, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6883, Mt6885, Mt6889, Mt6893, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",8.4,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2022-05-03T20:06:29.000Z,0 CVE-2022-20110,https://securityvulnerability.io/vulnerability/CVE-2022-20110,Race Condition Vulnerability in Mediatek's ion Component,"A race condition in Mediatek's ion component may allow an attacker to exploit a use after free vulnerability, potentially leading to local privilege escalation. This vulnerability can be exploited without user interaction, providing an opportunity for unauthorized access to system-level privileges. Immediate patches are recommended to mitigate this risk.",MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6750, Mt6750s, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6797, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6883, Mt6885, Mt6889, Mt6893, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",7,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-05-03T19:56:43.000Z,0 CVE-2022-20109,https://securityvulnerability.io/vulnerability/CVE-2022-20109,Local Escalation of Privilege in Ion by MediaTek,"The vulnerability in MediaTek's Ion arises from a possible use after free due to improper management of reference counts. This flaw can enable local escalation of privilege without requiring additional execution permissions, and it is exploitative without any action needed from users, making it a significant security concern. Affected versions require immediate attention to mitigate risks.",MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6750, Mt6750s, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6797, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6883, Mt6885, Mt6889, Mt6893, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-05-03T19:56:22.000Z,0 CVE-2022-20073,https://securityvulnerability.io/vulnerability/CVE-2022-20073,Out of Bounds Write Vulnerability in MediaTek USB Preloader,"An out of bounds write vulnerability exists in the USB Preloader of MediaTek devices due to an integer underflow. This flaw allows potential local privilege escalation for attackers possessing physical access to the vulnerable device. User interaction is required to exploit this vulnerability, making it crucial for users to be aware of physical access risks and implement necessary security measures.",MediaTek,"Mt2601, Mt6580, Mt6735, Mt6739, Mt6761, Mt6763, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6799, Mt6833, Mt6873, Mt6877, Mt6885, Mt6893, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",6.6,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2022-04-11T19:38:05.000Z,0