CVE-2023-20663
Published on: Not Yet Published
Last Modified on: 04/13/2023 05:27:00 PM UTC
Certain versions of Android from Google contain the following vulnerability:
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560741; Issue ID: ALPS07560741.
- CVE-2023-20663 has been assigned by
securi[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
MediaTek, Inc. - MT5221, MT6879, MT6895, MT6983, MT7902, MT7921, MT8167S, MT8168, MT8175, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8696, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8795T, MT8797, MT8798 version Android 12.0, 13.0 / Yocto 3.1, 3.3, 4.0 / Linux-4.19 (for MT5221, MT7921 and MT7902 chipsets only)
CVSS3 Score: 6.7 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | HIGH | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
April 2023 | corp.mediatek.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Android | 12.0 | All | All | All | |
Operating System | Android | 13.0 | All | All | All | |
Operating System | Linux | Linux Kernel | 4.19 | All | All | All |
Hardware
| Mediatek | Mt5221 | - | All | All | All |
Hardware
| Mediatek | Mt6879 | - | All | All | All |
Hardware
| Mediatek | Mt6895 | - | All | All | All |
Hardware
| Mediatek | Mt6983 | - | All | All | All |
Hardware
| Mediatek | Mt7902 | - | All | All | All |
Hardware
| Mediatek | Mt7921 | - | All | All | All |
Hardware
| Mediatek | Mt8167s | - | All | All | All |
Hardware
| Mediatek | Mt8168 | - | All | All | All |
Hardware
| Mediatek | Mt8175 | - | All | All | All |
Hardware
| Mediatek | Mt8362a | - | All | All | All |
Hardware
| Mediatek | Mt8365 | - | All | All | All |
Hardware
| Mediatek | Mt8385 | - | All | All | All |
Hardware
| Mediatek | Mt8518 | - | All | All | All |
Hardware
| Mediatek | Mt8532 | - | All | All | All |
Hardware
| Mediatek | Mt8696 | - | All | All | All |
Hardware
| Mediatek | Mt8766 | - | All | All | All |
Hardware
| Mediatek | Mt8768 | - | All | All | All |
Hardware
| Mediatek | Mt8771 | - | All | All | All |
Hardware
| Mediatek | Mt8781 | - | All | All | All |
Hardware
| Mediatek | Mt8786 | - | All | All | All |
Hardware
| Mediatek | Mt8788 | - | All | All | All |
Hardware
| Mediatek | Mt8789 | - | All | All | All |
Hardware
| Mediatek | Mt8791t | - | All | All | All |
Hardware
| Mediatek | Mt8795t | - | All | All | All |
Hardware
| Mediatek | Mt8797 | - | All | All | All |
Hardware
| Mediatek | Mt8798 | - | All | All | All |
Operating System | Yoctoproject | Yocto | 3.1 | All | All | All |
Operating System | Yoctoproject | Yocto | 3.3 | All | All | All |
Operating System | Yoctoproject | Yocto | 4.0 | All | All | All |
- cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*:
- cpe:2.3:o:yoctoproject:yocto:3.1:*:*:*:*:*:*:*:
- cpe:2.3:o:yoctoproject:yocto:3.3:*:*:*:*:*:*:*:
- cpe:2.3:o:yoctoproject:yocto:4.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-20663 : In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to lo… twitter.com/i/web/status/1… | 2023-04-06 18:12:35 |
![]() |
CVE-2023-20663 | 2023-04-06 19:39:29 |
![]() |
CVE-2023-20663 | 2023-04-06 20:29:13 |