CVE-2023-20652
Published on: Not Yet Published
Last Modified on: 04/13/2023 02:51:00 PM UTC
Certain versions of Android from Google contain the following vulnerability:
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589135.
- CVE-2023-20652 has been assigned by
securi[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
MediaTek, Inc. - MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8192, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8871, MT8891 version Android 10.0, 11.0, 12.0, 13.0
CVSS3 Score: 6.7 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | HIGH | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
April 2023 | corp.mediatek.com text/html |
![]() |
Related QID Numbers
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Android | 10.0 | All | All | All | |
Operating System | Android | 11.0 | All | All | All | |
Operating System | Android | 12.0 | All | All | All | |
Operating System | Android | 13.0 | All | All | All | |
Hardware
| Mediatek | Mt6580 | - | All | All | All |
Hardware
| Mediatek | Mt6731 | - | All | All | All |
Hardware
| Mediatek | Mt6735 | - | All | All | All |
Hardware
| Mediatek | Mt6737 | - | All | All | All |
Hardware
| Mediatek | Mt6739 | - | All | All | All |
Hardware
| Mediatek | Mt6753 | - | All | All | All |
Hardware
| Mediatek | Mt6757 | - | All | All | All |
Hardware
| Mediatek | Mt6757c | - | All | All | All |
Hardware
| Mediatek | Mt6757cd | - | All | All | All |
Hardware
| Mediatek | Mt6757ch | - | All | All | All |
Hardware
| Mediatek | Mt6761 | - | All | All | All |
Hardware
| Mediatek | Mt6762 | - | All | All | All |
Hardware
| Mediatek | Mt6763 | - | All | All | All |
Hardware
| Mediatek | Mt6765 | - | All | All | All |
Hardware
| Mediatek | Mt6768 | - | All | All | All |
Hardware
| Mediatek | Mt6769 | - | All | All | All |
Hardware
| Mediatek | Mt6771 | - | All | All | All |
Hardware
| Mediatek | Mt6779 | - | All | All | All |
Hardware
| Mediatek | Mt6781 | - | All | All | All |
Hardware
| Mediatek | Mt6785 | - | All | All | All |
Hardware
| Mediatek | Mt6789 | - | All | All | All |
Hardware
| Mediatek | Mt6833 | - | All | All | All |
Hardware
| Mediatek | Mt6853 | - | All | All | All |
Hardware
| Mediatek | Mt6853t | - | All | All | All |
Hardware
| Mediatek | Mt6855 | - | All | All | All |
Hardware
| Mediatek | Mt6873 | - | All | All | All |
Hardware
| Mediatek | Mt6875 | - | All | All | All |
Hardware
| Mediatek | Mt6877 | - | All | All | All |
Hardware
| Mediatek | Mt6879 | - | All | All | All |
Hardware
| Mediatek | Mt6883 | - | All | All | All |
Hardware
| Mediatek | Mt6885 | - | All | All | All |
Hardware
| Mediatek | Mt6889 | - | All | All | All |
Hardware
| Mediatek | Mt6891 | - | All | All | All |
Hardware
| Mediatek | Mt6893 | - | All | All | All |
Hardware
| Mediatek | Mt6895 | - | All | All | All |
Hardware
| Mediatek | Mt6983 | - | All | All | All |
Hardware
| Mediatek | Mt8185 | - | All | All | All |
Hardware
| Mediatek | Mt8192 | - | All | All | All |
Hardware
| Mediatek | Mt8321 | - | All | All | All |
Hardware
| Mediatek | Mt8385 | - | All | All | All |
Hardware
| Mediatek | Mt8666 | - | All | All | All |
Hardware
| Mediatek | Mt8667 | - | All | All | All |
Hardware
| Mediatek | Mt8673 | - | All | All | All |
Hardware
| Mediatek | Mt8675 | - | All | All | All |
Hardware
| Mediatek | Mt8765 | - | All | All | All |
Hardware
| Mediatek | Mt8766 | - | All | All | All |
Hardware
| Mediatek | Mt8768 | - | All | All | All |
Hardware
| Mediatek | Mt8771 | - | All | All | All |
Hardware
| Mediatek | Mt8781 | - | All | All | All |
Hardware
| Mediatek | Mt8786 | - | All | All | All |
Hardware
| Mediatek | Mt8788 | - | All | All | All |
Hardware
| Mediatek | Mt8789 | - | All | All | All |
Hardware
| Mediatek | Mt8791 | - | All | All | All |
Hardware
| Mediatek | Mt8791t | - | All | All | All |
Hardware
| Mediatek | Mt8795t | - | All | All | All |
Hardware
| Mediatek | Mt8797 | - | All | All | All |
Hardware
| Mediatek | Mt8798 | - | All | All | All |
Hardware
| Mediatek | Mt8871 | - | All | All | All |
Hardware
| Mediatek | Mt8891 | - | All | All | All |
- cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*:
- cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*:
- cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8192:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8871:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8891:-:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-20652 : In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could l… twitter.com/i/web/status/1… | 2023-04-06 18:08:49 |
![]() |
MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution - PATCH: NOW | 2023-04-04 12:39:28 |
![]() |
Samsung detailed May 2023 One UI patch | 2023-05-02 03:50:45 |