cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-32666,https://securityvulnerability.io/vulnerability/CVE-2022-32666,Remote Denial of Service in Wi-Fi Products by MediaTek,"A vulnerability in MediaTek Wi-Fi chipsets can lead to a reduction in throughput caused by the misrepresentation of critical information. This deficiency can be exploited remotely without requiring any user interaction, potentially causing a denial of service condition. Affected products should be updated with the latest patches to mitigate this vulnerability. For more information, check the official security bulletin.",MediaTek,"Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986, Mt8365",7.5,HIGH,0.0016299999551847577,false,false,false,false,,false,false,2023-07-04T01:44:59.030Z,0 CVE-2022-32655,https://securityvulnerability.io/vulnerability/CVE-2022-32655,,"In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705028; Issue ID: GN20220705028.",MediaTek,"Mt5221, Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7663, Mt7668, Mt7682, Mt7686, Mt7687, Mt7697, Mt7902, Mt7915, Mt7916, Mt7921, Mt7933, Mt7981, Mt7986, Mt8167s, Mt8175, Mt8362a, Mt8365, Mt8385, Mt8518s, Mt8532, Mt8695, Mt8696, Mt8788",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-02-06T00:00:00.000Z,0 CVE-2022-32656,https://securityvulnerability.io/vulnerability/CVE-2022-32656,,"In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705035; Issue ID: GN20220705035.",MediaTek,"Mt5221, Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7663, Mt7668, Mt7682, Mt7686, Mt7687, Mt7697, Mt7902, Mt7915, Mt7916, Mt7921, Mt7933, Mt7981, Mt7986, Mt8167s, Mt8175, Mt8362a, Mt8365, Mt8385, Mt8518s, Mt8532, Mt8695, Mt8696, Mt8788",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-02-06T00:00:00.000Z,0 CVE-2022-32654,https://securityvulnerability.io/vulnerability/CVE-2022-32654,,"In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705011; Issue ID: GN20220705011.",MediaTek,"Mt5221, Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7663, Mt7668, Mt7682, Mt7686, Mt7687, Mt7697, Mt7902, Mt7915, Mt7916, Mt7921, Mt7933, Mt7981, Mt7986, Mt8167s, Mt8175, Mt8362a, Mt8365, Mt8385, Mt8518s, Mt8532, Mt8695, Mt8696, Mt8788",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-02-06T00:00:00.000Z,0 CVE-2022-32663,https://securityvulnerability.io/vulnerability/CVE-2022-32663,Wi-Fi Driver Vulnerability in MediaTek Products,"A vulnerability exists within the Wi-Fi driver of MediaTek products, which may cause a system crash due to a null pointer dereference. Exploiting this flaw can lead to a remote denial of service, allowing attackers to disrupt the system without requiring any additional execution privileges. Importantly, user interaction is not necessary for this vulnerability to be exploited, making it a significant concern for the affected environments. Ensure your systems are updated with the latest patches to mitigate this risk.",MediaTek,"Mt5221, Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7668, Mt7902, Mt7915, Mt7916, Mt7921, Mt7981, Mt7986, Mt8167s, Mt8175, Mt8362a, Mt8365, Mt8385, Mt8518s, Mt8532, Mt8788",7.5,HIGH,0.0015399999683722854,false,false,false,false,,false,false,2023-02-06T00:00:00.000Z,0 CVE-2022-32659,https://securityvulnerability.io/vulnerability/CVE-2022-32659,,"In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705066; Issue ID: GN20220705066.",MediaTek,"Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986, Mt8518s, Mt8532",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-01-03T00:00:00.000Z,0 CVE-2022-32657,https://securityvulnerability.io/vulnerability/CVE-2022-32657,,"In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705042; Issue ID: GN20220705042.",MediaTek,"Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-01-03T00:00:00.000Z,0 CVE-2022-32658,https://securityvulnerability.io/vulnerability/CVE-2022-32658,,"In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705059; Issue ID: GN20220705059.",MediaTek,"Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-01-03T00:00:00.000Z,0