cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-20688,https://securityvulnerability.io/vulnerability/CVE-2023-20688,Out of Bounds Read Vulnerability in MediaTek Products,"This vulnerability involves a possible out of bounds read due to a missing bounds check in certain MediaTek products. If exploited, it may allow local information disclosure while requiring system execution privileges. Notably, user interaction is not necessary for this exploitation to occur. Affected products should be patched as per Patch ID: ALPS07441821 to mitigate potential risks.",MediaTek,"Mt2715, Mt6580, Mt6731, Mt6735, Mt6737, Mt6739, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8168, Mt8169, Mt8173, Mt8175, Mt8183, Mt8185, Mt8188, Mt8192, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8390, Mt8395, Mt8666, Mt8673, Mt8675, Mt8696, Mt8765, Mt8766, Mt8768, Mt8771, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8891",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-04-06T00:00:00.000Z,0 CVE-2022-26468,https://securityvulnerability.io/vulnerability/CVE-2022-26468,Out of Bounds Write Vulnerability in MediaTek Preloader USB,"The MediaTek Preloader USB is susceptible to an out of bounds write vulnerability due to a missing bounds check. This issue could permit a local attacker, with physical access to the device, to escalate privileges without needing additional execution permissions. Exploitation of this vulnerability requires user interaction, making it crucial for individuals and organizations using MediaTek products to be aware and apply necessary patches.",MediaTek,"Mt6735, Mt6739, Mt6761, Mt6763, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6855, Mt6873, Mt6877, Mt6879, Mt6885, Mt6893, Mt6895, Mt6983, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8735a, Mt8735b, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8797",6.6,MEDIUM,0.0004799999878741801,false,,false,false,false,,,false,false,,2022-09-06T17:19:08.000Z,0 CVE-2022-21776,https://securityvulnerability.io/vulnerability/CVE-2022-21776,Local Privilege Escalation Vulnerability in MediaTek's MDP Software,"The vulnerability in MediaTek's MDP software arises from a use-after-free condition caused by a race condition. This flaw may allow an attacker to escalate privileges on the affected system, enabling them to execute commands with system-level permissions. Exploitation of this vulnerability does not require user interaction, making it a significant risk to system integrity. A patch has been released to address this issue, ensuring that affected users are encouraged to update to the latest version.",MediaTek,"Mt6580, Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6873, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6893, Mt6895, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8791, Mt8797, Mt8798",6.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-07-06T13:07:25.000Z,0 CVE-2022-21767,https://securityvulnerability.io/vulnerability/CVE-2022-21767,Out of Bounds Write Vulnerability in Bluetooth by MediaTek,"The vulnerability identified in Bluetooth implementations by MediaTek arises from a missing bounds check, which allows for a possible out of bounds write condition. Such a flaw may facilitate local escalation of privilege without requiring additional execution privileges. Exploitation of this vulnerability does not necessitate user interaction, posing a significant security risk for affected devices. This issue has been documented with Patch ID ALPS06784430.",MediaTek,"Mt8167, Mt8175, Mt8183, Mt8362a, Mt8365, Mt8385",8.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2022-07-06T13:05:46.000Z,0 CVE-2022-20075,https://securityvulnerability.io/vulnerability/CVE-2022-20075,Out of Bounds Write Vulnerability in MediaTek Products,"An out of bounds write vulnerability exists within the ged component due to an integer overflow, potentially allowing a local attacker to escalate privileges. This vulnerability does not require user interaction for exploitation, resulting in system execution privileges being achievable. It is critical for users of affected MediaTek products to apply the relevant patches to mitigate any associated risks.",MediaTek,"Mt6580, Mt6731, Mt6735, Mt6750s, Mt6753, Mt6755s, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6883, Mt6885, Mt6889, Mt6891, Mt6893, Mt8127, Mt8135, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8176, Mt8183, Mt8312c, Mt8312d, Mt8321, Mt8362a, Mt8365, Mt8382, Mt8385, Mt8389, Mt8392, Mt8392 90, Mt8665, Mt8685, Mt8693, Mt8735, Mt8735b, Mt8735m, Mt8752, Mt8765, Mt8783, Mt8785, Mt8788",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2022-04-11T19:38:07.000Z,0 CVE-2022-20076,https://securityvulnerability.io/vulnerability/CVE-2022-20076,Memory Corruption Vulnerability in MediaTek Products,"A vulnerability in the ged software from MediaTek has been identified, which involves a potential memory corruption arising from improper error handling. This issue can facilitate local information disclosure, requiring attackers to have system execution privileges for exploitation. Notably, user interaction is unnecessary for the attack to succeed, increasing the risk of exploitation. Proper patches have been developed to address this issue, and users are encouraged to apply the necessary updates.",MediaTek,"Mt6580, Mt6731, Mt6735, Mt6750s, Mt6753, Mt6755s, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6883, Mt6885, Mt6889, Mt6891, Mt6893, Mt8127, Mt8135, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8176, Mt8183, Mt8312c, Mt8312d, Mt8321, Mt8362a, Mt8365, Mt8382, Mt8385, Mt8389, Mt8392, Mt8392 90, Mt8665, Mt8685, Mt8693, Mt8735, Mt8735b, Mt8735m, Mt8752, Mt8765, Mt8783, Mt8785, Mt8788",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-04-11T19:38:07.000Z,0 CVE-2022-20073,https://securityvulnerability.io/vulnerability/CVE-2022-20073,Out of Bounds Write Vulnerability in MediaTek USB Preloader,"An out of bounds write vulnerability exists in the USB Preloader of MediaTek devices due to an integer underflow. This flaw allows potential local privilege escalation for attackers possessing physical access to the vulnerable device. User interaction is required to exploit this vulnerability, making it crucial for users to be aware of physical access risks and implement necessary security measures.",MediaTek,"Mt2601, Mt6580, Mt6735, Mt6739, Mt6761, Mt6763, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6799, Mt6833, Mt6873, Mt6877, Mt6885, Mt6893, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",6.6,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2022-04-11T19:38:05.000Z,0 CVE-2022-20072,https://securityvulnerability.io/vulnerability/CVE-2022-20072,Local Privilege Escalation in MediaTek Search Engine Service,"A vulnerability exists in the search engine service of MediaTek products, allowing attackers to manipulate the default search engine due to an incorrect comparison mechanism. This flaw can lead to local privilege escalation, granting unauthorized system execution privileges without requiring user interaction. It is crucial for users and administrators to apply patches and remain vigilant against potential exploits of this nature.",MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6753, Mt6755, Mt6755s, Mt6761, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6795, Mt6797, Mt6799, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6879, Mt6880, Mt6883, Mt6885, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6983, Mt6985, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8791, Mt8797",6.7,MEDIUM,0.0012100000167265534,false,,false,false,false,,,false,false,,2022-04-11T19:38:04.000Z,0 CVE-2022-20069,https://securityvulnerability.io/vulnerability/CVE-2022-20069,Out of Bounds Write Vulnerability in Preloader by MediaTek,"A vulnerability exists in MediaTek's Preloader (USB) that allows for a possible out of bounds write due to an integer overflow. This issue poses a risk of local privilege escalation for attackers who possess physical access to the affected device. Exploitation requires user interaction, making awareness and caution essential to protect sensitive data and device integrity. The vulnerability has been documented in the MediaTek product security bulletin.",MediaTek,"Mt6580, Mt6735, Mt6739, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6799, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6877, Mt6885, Mt6893, Mt6983, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",6.6,MEDIUM,0.00046999999904073775,false,,false,false,false,,,false,false,,2022-04-11T19:38:02.000Z,0 CVE-2022-20068,https://securityvulnerability.io/vulnerability/CVE-2022-20068,Symbolic Link Following Vulnerability in MediaTek Mobile Products,"In the mobile_log_d component of MediaTek's products, a vulnerability exists due to improper resolution of symbolic links. This weakness could allow attackers to escalate privileges locally, requiring system execution privileges for exploitation. Importantly, exploitation does not require user interaction, heightening the risk of unauthorized access. A patch is available to mitigate this issue.",MediaTek,"Mt6731, Mt6732, Mt6735, Mt6737, Mt6739, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6795, Mt6799, Mt6833, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6880, Mt6883, Mt6885, Mt6889, Mt6890, Mt6891, Mt6893, Mt6985, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8735a, Mt8735b, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-04-11T19:38:01.000Z,0 CVE-2022-20052,https://securityvulnerability.io/vulnerability/CVE-2022-20052,Memory Corruption Vulnerability in Mediatek Products,"The vulnerability in Mediatek's mdp involves a potential memory corruption due to a use after free condition. This flaw could allow a malicious actor to escalate local privileges, granting them elevated system execution capabilities. Exploitation requires user interaction, necessitating careful handling of the affected systems. Patches are available to mitigate this risk, stressing the importance of timely updates to secure environments.",MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6750, Mt6753, Mt6755, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6877, Mt6885, Mt6890, Mt6891, Mt6893, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8735a, Mt8735b, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788",6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2022-04-11T19:38:00.000Z,0 CVE-2022-20062,https://securityvulnerability.io/vulnerability/CVE-2022-20062,Memory Corruption Vulnerability in MediaTek Products,"In MediaTek's mdp, a vulnerability exists that allows for memory corruption due to a 'use after free' issue. This flaw can potentially be exploited locally, permitting an escalation of privileges to System execution levels without requiring user interaction. It is essential for users of affected MediaTek products to apply the necessary patches to protect against potential exploitation.",MediaTek,"Mt6765, Mt6785, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6877, Mt6879, Mt6885, Mt6891, Mt6893, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8735a, Mt8735b, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-04-11T19:37:55.000Z,0 CVE-2022-20050,https://securityvulnerability.io/vulnerability/CVE-2022-20050,Local Privilege Escalation Vulnerability in Connsyslogger by MediaTek,A vulnerability in Connsyslogger allows for potential local privilege escalation due to improper symbolic link resolution. This issue does not require user interaction for exploitation and could lead to unauthorized access with elevated system privileges. The vulnerability is identified with Patch ID: ALPS06335038.,MediaTek,"Mt6762, Mt6765, Mt6768, Mt6769, Mt6779, Mt6781, Mt6785, Mt6795, Mt6797, Mt6799, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6880, Mt6883, Mt6885, Mt6889, Mt6891, Mt6893, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8696, Mt8735a, Mt8735b, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-03-10T17:45:00.000Z,0 CVE-2022-20046,https://securityvulnerability.io/vulnerability/CVE-2022-20046,Memory Corruption in Bluetooth Functionality of MediaTek Products,"A vulnerability has been identified in the Bluetooth functionality of certain MediaTek devices, resulting from a logic error that can cause memory corruption. This issue allows local denial of service without requiring additional execution privileges or user interaction to exploit the flaw. Affected users are encouraged to apply the latest patches to mitigate any potential risks associated with this vulnerability.",MediaTek,"Mt8167, Mt8175, Mt8183, Mt8362a, Mt8365, Mt8385",5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-09T22:05:49.000Z,0 CVE-2022-20045,https://securityvulnerability.io/vulnerability/CVE-2022-20045,Bluetooth Service Vulnerability in MediaTek Products,"This vulnerability in Bluetooth implementations allows for a potential service crash due to a use after free condition. This could enable local privilege escalation without requiring any additional execution privileges or user interaction. Users of MediaTek Bluetooth-enabled devices should stay informed and apply the necessary security patches to mitigate this risk. For further information and patch details, refer to the MediaTek security bulletin.",MediaTek,"Mt8167, Mt8175, Mt8183, Mt8362a, Mt8365, Mt8385",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-09T22:05:48.000Z,0 CVE-2022-20044,https://securityvulnerability.io/vulnerability/CVE-2022-20044,Local Privilege Escalation Vulnerability in Bluetooth on MediaTek Devices,"A use after free vulnerability in the Bluetooth implementation on MediaTek devices may lead to a service crash, allowing local escalation of privilege without requiring any additional execution privileges. The issue can be exploited without user interaction, raising significant security concerns for affected devices. Users of MediaTek devices are advised to apply the necessary patches to mitigate potential risks. For detailed information, refer to the official MediaTek product security bulletin.",MediaTek,"Mt8167, Mt8175, Mt8183, Mt8362a, Mt8365, Mt8385",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-09T22:05:47.000Z,0 CVE-2022-20043,https://securityvulnerability.io/vulnerability/CVE-2022-20043,Bluetooth Elevation of Privilege in Mediatek Products,"A vulnerability exists in Mediatek Bluetooth products that allows for a potential escalation of privilege due to a missing permission check. This flaw can be exploited locally without the need for additional execution privileges or user interaction, enabling unauthorized access to sensitive functions within the device. It is crucial for users of affected Mediatek devices to ensure they are running the latest security patches to mitigate this risk. For detailed information, refer to the Mediatek product security bulletin.",MediaTek,"Mt8167, Mt8175, Mt8183, Mt8362a, Mt8365, Mt8385",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-09T22:05:46.000Z,0 CVE-2022-20042,https://securityvulnerability.io/vulnerability/CVE-2022-20042,Information Disclosure in Bluetooth by MediaTek Products,"A flaw in the Bluetooth implementation within certain MediaTek products allows for information disclosure due to improper error handling. This vulnerability could potentially expose sensitive data under specific conditions, without requiring elevated privileges or user interaction. Affected users should consult Patch ID: ALPS06108487 to mitigate risks associated with this vulnerability.",MediaTek,"Mt8167, Mt8175, Mt8183, Mt8362a, Mt8365, Mt8385",5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-09T22:05:45.000Z,0 CVE-2022-20041,https://securityvulnerability.io/vulnerability/CVE-2022-20041,Local Privilege Escalation in Bluetooth Technology by MediaTek,A security vulnerability in Bluetooth technology from MediaTek allows for local privilege escalation due to a missing permission check. This issue can be exploited without requiring any user interaction and does not necessitate additional execution privileges. The vulnerability poses significant risks as it enables unauthorized users to potentially gain elevated access on affected devices. Mitigation measures include applying the necessary security patches provided by MediaTek to safeguard your systems.,MediaTek,"Mt8167, Mt8175, Mt8183, Mt8362a, Mt8365, Mt8385",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-09T22:05:45.000Z,0 CVE-2022-20029,https://securityvulnerability.io/vulnerability/CVE-2022-20029,Information Disclosure Vulnerability in MediaTek Cmdq Driver,"The cmdq driver from MediaTek has a vulnerability that allows for a potential out-of-bounds read due to an incorrect bounds check. This flaw could lead to local information disclosure that requires system execution privileges for exploitation. Importantly, no user interaction is needed to execute the attack, making this a notable risk for users of affected MediaTek products. A patch addressing this vulnerability has been identified and must be applied to mitigate the potential threat.",MediaTek,"Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6785, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6883, Mt6885, Mt6889, Mt6891, Mt6893, Mt8163, Mt8167, Mt8168, Mt8173, Mt8175, Mt8183, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8735b, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8791, Mt8797",4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-09T22:05:35.000Z,0 CVE-2022-20028,https://securityvulnerability.io/vulnerability/CVE-2022-20028,Out of Bounds Write Vulnerability in Mediatek Bluetooth Products,"In Bluetooth systems developed by Mediatek, there exists a vulnerability characterized by a possible out of bounds write due to a missing bounds check. This issue allows for local escalation of privilege without requiring additional execution privileges or user interaction for exploitation. Prompt attention through available patches is advised to mitigate potential risks.",MediaTek,"Mt8167, Mt8175, Mt8183, Mt8362a, Mt8365, Mt8385",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-09T22:05:34.000Z,0 CVE-2022-20026,https://securityvulnerability.io/vulnerability/CVE-2022-20026,Out of Bounds Write Vulnerability in MediaTek Bluetooth Products,"A vulnerability exists in MediaTek Bluetooth products that allows for an out of bounds write due to a missing bounds check. This flaw enables potential local escalation of privileges without the need for additional execution privileges or user interaction, posing a significant risk to device security. Affected users are encouraged to apply the necessary patches to mitigate this vulnerability.",MediaTek,"Mt8167, Mt8175, Mt8183, Mt8362a, Mt8365, Mt8385",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-09T22:05:33.000Z,0 CVE-2022-20027,https://securityvulnerability.io/vulnerability/CVE-2022-20027,Out of Bounds Write Vulnerability in Bluetooth by MediaTek,A vulnerability in Bluetooth by MediaTek allows for a possible out of bounds write due to a missing bounds check. This issue could enable an attacker to escalate their privileges on affected devices without requiring additional execution rights or user interaction. The flaw is documented with Patch ID ALPS06126826 and poses significant security considerations that warrant immediate attention and remediation.,MediaTek,"Mt8167, Mt8175, Mt8183, Mt8362a, Mt8365, Mt8385",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-09T22:05:33.000Z,0 CVE-2022-20025,https://securityvulnerability.io/vulnerability/CVE-2022-20025,Out of Bounds Write Vulnerability in Bluetooth Products by MediaTek,"A vulnerability in Bluetooth technology has been identified where a missing bounds check may lead to an out of bounds write. This flaw can enable local escalation of privileges, allowing an unprivileged user to gain more control without requiring additional execution privileges. Importantly, exploitation of this vulnerability does not necessitate user interaction, making it a critical concern for device security. For more details on the remediation, refer to MediaTek's product security bulletin.",MediaTek,"Mt8167, Mt8175, Mt8183, Mt8362a, Mt8365, Mt8385",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-09T22:05:32.000Z,0 CVE-2022-20023,https://securityvulnerability.io/vulnerability/CVE-2022-20023,Bluetooth Flooding Vulnerability in MediaTek Devices,"This vulnerability involves a scenario where Bluetooth-enabled devices can be flooded with unexpected LMP_AU_rand packets, potentially causing the application to crash. With no additional execution privileges required, attackers can exploit this issue remotely, making user interaction unnecessary. This denial of service attack can compromise Bluetooth functionality, highlighting the need for timely updates and security patches to mitigate risks.",MediaTek,"Mt6580, Mt6630, Mt6735, Mt6737, Mt6739, Mt6750s, Mt6753, Mt6755s, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6771, Mt6779, Mt6785, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6877, Mt6885, Mt6889, Mt6893, Mt7662t, Mt7663, Mt7668, Mt7915, Mt7920, Mt7921, Mt7922, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8195, Mt8321, Mt8362a, Mt8362b, Mt8365, Mt8385, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",6.5,MEDIUM,0.0005099999834783375,false,,false,false,false,,,false,false,,2022-01-04T15:57:24.000Z,0