cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-20108,https://securityvulnerability.io/vulnerability/CVE-2024-20108,Possible Out of Bounds Write Leads to Local Escalation of Privilege,"In atci, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09082988; Issue ID: MSV-1774.",MediaTek,"Mt6580, Mt6739, Mt6761, Mt6765, Mt6768, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6835, Mt6853, Mt6855, Mt6873, Mt6877, Mt6878, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6893, Mt6895, Mt6896, Mt6897, Mt6983, Mt6985, Mt6989, Mt8168, Mt8173, Mt8175, Mt8185, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8370, Mt8385, Mt8390, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8676, Mt8678, Mt8755, Mt8765, Mt8766, Mt8768, Mt8771, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8792, Mt8795t, Mt8796, Mt8797, Mt8798",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-04T01:48:43.978Z,0 CVE-2023-32871,https://securityvulnerability.io/vulnerability/CVE-2023-32871,Possible Permission Bypass in DA Product Could Lead to Local Escalation of Privilege,"A permission bypass vulnerability has been identified in MediaTek's products caused by an incorrect status check mechanism. This flaw allows an attacker to escalate privileges locally without requiring additional execution privileges or user interaction. Such vulnerabilities pose risks as they could be exploited to increase the privileges of a user or process beyond intended limitations, potentially leading to unauthorized access and control over the affected systems. Users and organizations utilizing MediaTek's products are advised to apply the necessary security patch identified as ALPS08355514 to mitigate this risk.",MediaTek,"Mt2737, Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6835, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6877, Mt6879, Mt6880, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6893, Mt6895, Mt6897, Mt6980, Mt6983, Mt6985, Mt6989, Mt6990, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8390, Mt8395, Mt8755, Mt8765, Mt8766, Mt8768, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797, Mt8798",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-06T02:51:52.075Z,0 CVE-2024-20051,https://securityvulnerability.io/vulnerability/CVE-2024-20051,Possible System Crash Due to Uncaught Exception,"In flashc, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541758.",MediaTek,"Mt2713, Mt2737, Mt6781, Mt6789, Mt6835, Mt6855, Mt6879, Mt6880, Mt6886, Mt6890, Mt6895, Mt6980, Mt6983, Mt6985, Mt6989, Mt6990, Mt8167, Mt8168, Mt8173, Mt8175, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8390, Mt8395, Mt8666, Mt8667, Mt8673, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8796, Mt8797, Mt8798",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-04-01T03:15:00.000Z,0 CVE-2024-20039,https://securityvulnerability.io/vulnerability/CVE-2024-20039,Possible Out of Bounds Write in Modem Protocol Could Lead to Remote Code Execution,"In modem protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01240012; Issue ID: MSV-1215.",MediaTek,"Mt2731, Mt2735, Mt2737, Mt3967, Mt6297, Mt6298, Mt6739, Mt6761, Mt6762, Mt6762d, Mt6762m, Mt6763, Mt6765, Mt6765t, Mt6767, Mt6768, Mt6769, Mt6769t, Mt6769z, Mt6771, Mt6779, Mt6781, Mt6783, Mt6785, Mt6785t, Mt6785u, Mt6789, Mt6813, Mt6815, Mt6833, Mt6835, Mt6853, Mt6855, Mt6873, Mt6875, Mt6875t, Mt6877, Mt6879, Mt6880, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6895t, Mt6896, Mt6897, Mt6980, Mt6980d, Mt6983, Mt6985, Mt6986, Mt6986d, Mt6989, Mt6990, Mt8666, Mt8667, Mt8673, Mt8675, Mt8676, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8791, Mt8791t, Mt8792, Mt8796, Mt8797, Mt8798",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-04-01T03:15:00.000Z,0 CVE-2024-20050,https://securityvulnerability.io/vulnerability/CVE-2024-20050,Flashc Information Disclosure Vulnerability,"In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541757.",MediaTek,"Mt2713, Mt2737, Mt6781, Mt6789, Mt6835, Mt6855, Mt6879, Mt6880, Mt6886, Mt6890, Mt6895, Mt6980, Mt6983, Mt6985, Mt6989, Mt6990, Mt8167, Mt8168, Mt8173, Mt8175, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8390, Mt8395, Mt8666, Mt8667, Mt8673, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8796, Mt8797, Mt8798",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-04-01T03:15:00.000Z,0 CVE-2024-20013,https://securityvulnerability.io/vulnerability/CVE-2024-20013,Possible Out of Bounds Write Could Lead to Local Escalation of Privilege,"In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08471742; Issue ID: ALPS08308608.",MediaTek,"MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-02-05T05:59:36.678Z,0 CVE-2024-20010,https://securityvulnerability.io/vulnerability/CVE-2024-20010,Possible Escalation of Privilege Vulnerability in keyInstall,"In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358560; Issue ID: ALPS08358560.",MediaTek,"MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-02-05T05:59:30.948Z,0 CVE-2023-32872,https://securityvulnerability.io/vulnerability/CVE-2023-32872,Out of Bounds Write Vulnerability in MediaTek KeyInstall Component,"A vulnerability exists within the KeyInstall component of MediaTek due to a missing bounds check, enabling a possible out of bounds write. This flaw may allow a local attacker to escalate privileges to System execution privileges without requiring user interaction. Proper patching measures should be implemented promptly, particularly for versions prior to Patch ID ALPS08308607, to mitigate potential risks associated with this issue.",MediaTek,"MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-01-02T03:15:00.000Z,0 CVE-2023-32884,https://securityvulnerability.io/vulnerability/CVE-2023-32884,Information Disclosure Vulnerability in MediaTek NetDagent,"A vulnerability exists in MediaTek's NetDagent due to improper bounds checking, leading to possible information disclosure. This issue may allow an attacker to escalate privileges locally with System execution rights. Exploitation of this vulnerability does not require user interaction, thus posing a significant threat to system integrity and user data. Affected versions have been patched under Patch ID ALPS07944011 to address this security concern.",MediaTek,"MT2713, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8188, MT8192, MT8195, MT8195Z, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8696, MT8755, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8871",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-01-02T03:15:00.000Z,0 CVE-2023-32875,https://securityvulnerability.io/vulnerability/CVE-2023-32875,Information Disclosure Vulnerability in MediaTek KeyInstall Component,"The vulnerability in MediaTek’s keyInstall component results from a missing bounds check, enabling a potential information disclosure. This issue allows attackers to gain unauthorized access to sensitive data, requiring system execution privileges to exploit. The vulnerability does not necessitate user interaction, raising concerns for local information security. Affected systems should prioritize implementing the patch ID ALPS08308607 to mitigate this risk.",MediaTek,"Mt6580, Mt6731, Mt6735, Mt6737, Mt6739, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6835, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, Mt6985, Mt8185, Mt8321, Mt8385, Mt8666, Mt8667, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797, Mt8798",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-01-02T03:15:00.000Z,0 CVE-2023-32876,https://securityvulnerability.io/vulnerability/CVE-2023-32876,Information Disclosure Vulnerability in MediaTek KeyInstall,"The vulnerability in MediaTek's KeyInstall component arises from a missing bounds check, which could lead to local information disclosure. This issue allows unauthorized access to sensitive information within the system, requiring system execution privileges for exploitation. No user interaction is necessary, making the vulnerability particularly concerning for users relying on the affected product. MediaTek has issued a patch to address this issue, and users are strongly advised to update their systems to mitigate potential risks.",MediaTek,"MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-01-02T03:15:00.000Z,0 CVE-2023-32834,https://securityvulnerability.io/vulnerability/CVE-2023-32834,Memory Corruption Vulnerability in MediaTek's Secmem Component,"A memory corruption issue exists in MediaTek's Secmem component due to type confusion, potentially allowing an attacker to escalate privileges to system execution levels. This vulnerability does not require any user interaction for exploitation and poses significant security risks. The associated patch is identified as ALPS08161762. It is crucial for users and administrators to apply the necessary updates to mitigate any potential threats.",MediaTek,"MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-11-06T04:15:00.000Z,0 CVE-2023-32835,https://securityvulnerability.io/vulnerability/CVE-2023-32835,Memory Corruption Vulnerability in KeyInstall by MediaTek,"A vulnerability in MediaTek's KeyInstall has been identified, characterized by a potential memory corruption due to type confusion. This vulnerability poses a risk of local privilege escalation, enabling unauthorized users to execute system-level commands without requiring user interaction. To mitigate this risk, users and administrators are encouraged to apply the latest patches and updates as soon as they become available.",MediaTek,"MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-11-06T04:15:00.000Z,0 CVE-2023-20702,https://securityvulnerability.io/vulnerability/CVE-2023-20702,5G NRLC Remote Denial of Service Vulnerability in MediaTek Products,"A significant vulnerability exists in MediaTek's 5G NRLC that allows for potential remote denial of service due to inadequate error handling during memory access. This flaw arises when the User Equipment (UE) processes an invalid 1-byte RLC Service Data Unit (SDU). Notably, exploitation of this vulnerability does not require any special execution privileges or user interaction, making it particularly concerning for device stability. Affected users should consider applying the available patches as outlined in the MediaTek product security bulletin.",MediaTek,"Mt6835, Mt6873, Mt6875, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6895, Mt6980, Mt6983, Mt6985, Mt6990, Mt8673, Mt8675, Mt8791, Mt8791t, Mt8797, Mt8798",7.5,HIGH,0.0014400000218302011,false,,false,false,false,,,false,false,,2023-11-06T04:15:00.000Z,0 CVE-2023-32827,https://securityvulnerability.io/vulnerability/CVE-2023-32827,Out of Bounds Write Vulnerability in MediaTek Camera Middleware,"A vulnerability exists in MediaTek's camera middleware that can result in an out of bounds write due to insufficient input validation. This flaw may allow attackers to escalate privileges locally, granting them system execution capabilities. Notably, exploitation does not require user interaction, making the vulnerability particularly concerning for system security. It's crucial for users and organizations leveraging MediaTek technology to apply the necessary patches to mitigate potential risks.",MediaTek,"Mt6879, Mt6886, Mt6895, Mt6983, Mt6985, Mt6989, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8390, Mt8395, Mt8666, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797, Mt8798",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-10-02T03:15:00.000Z,0 CVE-2023-32826,https://securityvulnerability.io/vulnerability/CVE-2023-32826,Out of Bounds Write Vulnerability in MediaTek Camera Middleware,"A vulnerability in MediaTek's camera middleware allows for an out-of-bounds write due to insufficient input validation. This security flaw can enable an attacker to escalate privileges locally, granting system execution capabilities. Importantly, the exploitation of this vulnerability does not require any user interaction, making it a serious concern for users of the affected products. Affected users are advised to apply the latest patches to mitigate potential risks.",MediaTek,"Mt6879, Mt6886, Mt6895, Mt6983, Mt6985, Mt6989, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8390, Mt8395, Mt8666, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797, Mt8798",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-10-02T03:15:00.000Z,0 CVE-2023-20819,https://securityvulnerability.io/vulnerability/CVE-2023-20819,Out of Bounds Write Vulnerability in CDMA PPP Protocol by MediaTek,"The CDMA PPP protocol in MediaTek devices contains a vulnerability characterized by an out of bounds write resulting from a missing bounds check. This flaw allows an attacker to perform remote privilege escalation without requiring any user interaction or special execution privileges. The potential exploitation of this vulnerability could lead to significant security risks, making prompt attention to the issue critical. Affected users are advised to apply patches and updates to mitigate this vulnerability effectively.",MediaTek,"Mt2731, Mt6570, Mt6580, Mt6595, Mt6732, Mt6735, Mt6737, Mt6737m, Mt6738, Mt6739, Mt6750, Mt6750s, Mt6752, Mt6753, Mt6755, Mt6757, Mt6758, Mt6761, Mt6762, Mt6762d, Mt6762m, Mt6763, Mt6765, Mt6765t, Mt6767, Mt6768, Mt6769, Mt6769t, Mt6769z, Mt6771, Mt6775, Mt6779, Mt6781, Mt6783, Mt6785, Mt6785t, Mt6789, Mt6795, Mt6797, Mt6799, Mt6813, Mt6815, Mt6833, Mt6835, Mt6853, Mt6855, Mt6873, Mt6875, Mt6875t, Mt6877, Mt6878, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6891, Mt6893, Mt6895, Mt6895t, Mt6896, Mt6897, Mt6983, Mt6985, Mt6989, Mt8666, Mt8666a, Mt8667, Mt8673, Mt8675, Mt8765, Mt8766, Mt8766z, Mt8768, Mt8768a, Mt8768b, Mt8768t, Mt8768z, Mt8781, Mt8786, Mt8788, Mt8788t, Mt8788x, Mt8788z, Mt8791, Mt8791t, Mt8797, Mt8798",9.8,CRITICAL,0.0036700000055134296,false,,false,false,false,,,false,false,,2023-10-02T03:15:00.000Z,0 CVE-2023-32809,https://securityvulnerability.io/vulnerability/CVE-2023-32809,Improper Access Control in Bluetooth Driver Affects MediaTek Devices,"A vulnerability has been identified in the Bluetooth driver of MediaTek devices, where improper access control allows unauthorized read and write operations to register interfaces. This flaw can facilitate a local leak of sensitive information, requiring system execution privileges for exploitation. Importantly, user interaction is not required to trigger this vulnerability, heightening the risk of misuse. A patch has been issued to address this issue, and it is advisable for affected users to implement the update.",MediaTek,"MT2713, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT8168, MT8175, MT8188, MT8195, MT8365, MT8666, MT8667, MT8673, MT8781, MT8781WIFI, MT8791, MT8791T, MT8791WIFI, MT8797, MT8797WIFI",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-09-04T03:15:00.000Z,0 CVE-2023-32810,https://securityvulnerability.io/vulnerability/CVE-2023-32810,Out of Bounds Read Vulnerability in MediaTek Bluetooth Driver,"A vulnerability exists in the MediaTek Bluetooth driver due to improper input validation, resulting in a potential out of bounds read condition. This flaw could allow attackers with system execution privileges to access sensitive information, thereby compromising user data. Notably, user interaction is not required for the exploitation of this vulnerability, highlighting the urgency for patching and awareness. Affected users should ensure they apply the necessary updates to mitigate the risks associated with this security issue.",MediaTek,"MT2713, MT5221, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6890, MT6893, MT6895, MT6983, MT8167, MT8168, MT8173, MT8175, MT8185, MT8188, MT8188T, MT8195, MT8321, MT8365, MT8385, MT8518S, MT8532, MT8666, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-09-04T03:15:00.000Z,0 CVE-2023-20833,https://securityvulnerability.io/vulnerability/CVE-2023-20833,Information Disclosure Vulnerability in Keyinstall from MediaTek,"An information disclosure vulnerability exists in MediaTek's Keyinstall due to a missing bounds check. This flaw may allow for local information disclosure with system execution privileges. Notably, user interaction is not required for the exploitation of this vulnerability, posing a significant risk to affected systems. Immediate remediation is advised following the release of patch ALPS08017756.",MediaTek,"Mt6580, Mt6731, Mt6735, Mt6737, Mt6739, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6835, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, Mt6985, Mt8185, Mt8321, Mt8385, Mt8666, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-09-04T03:15:00.000Z,0 CVE-2023-20821,https://securityvulnerability.io/vulnerability/CVE-2023-20821,Out of Bounds Write Vulnerability in MediaTek NVRAM,"A vulnerability exists in MediaTek's NVRAM that allows for an out of bounds write due to a lack of sufficient bounds checking. This weakness could enable an attacker to perform local privilege escalation, potentially allowing unauthorized access to System execution privileges. Notably, user interaction is not required for the exploitation of this flaw, posing a risk in environments where the affected systems are utilized.",MediaTek,"Mt2713, Mt2735, Mt6833, Mt6835, Mt6853, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6880, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6980, Mt6983, Mt6985, Mt6990, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-09-04T03:15:00.000Z,0 CVE-2023-32808,https://securityvulnerability.io/vulnerability/CVE-2023-32808,Improper Access Control in Bluetooth Driver Affects MediaTek Devices,"The Bluetooth driver in MediaTek products is affected by a vulnerability that allows unauthorized read and write access to registers due to inadequate access control measures. This flaw could potentially lead to the local disclosure of sensitive information, necessitating system execution privileges for exploitation. Importantly, user interaction is not required for an attacker to exploit this vulnerability, which increases its risk profile. A patch has been issued to address this issue. For further details, consult the product security bulletin from MediaTek.",MediaTek,"MT2713, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT8168, MT8175, MT8188, MT8195, MT8365, MT8666, MT8667, MT8673, MT8781, MT8781WIFI, MT8791, MT8791T, MT8791WIFI, MT8797, MT8797WIFI",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-09-04T03:15:00.000Z,0 CVE-2023-20781,https://securityvulnerability.io/vulnerability/CVE-2023-20781,Memory Corruption Vulnerability in Mediatek KeyInstall Product,"The KeyInstall product by Mediatek is susceptible to memory corruption due to an inadequately implemented bounds check. This vulnerability can result in a local denial of service, requiring system execution privileges to exploit. User interaction is not necessary for an attacker to take advantage of this flaw, highlighting a significant risk to systems relying on this product. A patch has been developed and is identified by Patch ID: ALPS08017756.",MediaTek,"Mt6580, Mt6731, Mt6735, Mt6737, Mt6739, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6835, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, Mt6985, Mt8185, Mt8321, Mt8385, Mt8666, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-08-07T04:15:00.000Z,0 CVE-2023-20784,https://securityvulnerability.io/vulnerability/CVE-2023-20784,Out of Bounds Write Vulnerability in MediaTek KeyInstall,"A vulnerability exists in MediaTek's KeyInstall that allows an out-of-bounds write due to a missing bounds check. This flaw could enable an attacker to escalate local privileges without needing user interaction. To address this issue, MediaTek has released a patch identified as ALPS07826989. It is crucial for users of affected KeyInstall versions to apply the necessary updates promptly to safeguard their systems.",MediaTek,"Mt6580, Mt6731, Mt6735, Mt6737, Mt6739, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6835, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, Mt6985, Mt8185, Mt8321, Mt8385, Mt8666, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-08-07T04:15:00.000Z,0 CVE-2023-20790,https://securityvulnerability.io/vulnerability/CVE-2023-20790,Out of Bounds Write Vulnerability in NVRAM by MediaTek,"A potential out of bounds write vulnerability exists in the NVRAM component of MediaTek products. This flaw arises from a missing bounds check, which can lead to local information disclosure, necessitating system execution privileges for exploitation. Notably, user interaction is not required for the attack, allowing it to be executed without prior consent from the user. A patch has been issued to address this vulnerability, emphasizing the importance of maintaining updated software to safeguard against potential exploits.",MediaTek,"Mt2713, Mt2735, Mt2737, Mt6739, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6835, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6880, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6980, Mt6983, Mt6985, Mt6990, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-08-07T04:15:00.000Z,0