CVE-2023-20676
Published on: Not Yet Published
Last Modified on: 04/12/2023 07:41:00 PM UTC
Certain versions of Android from Google contain the following vulnerability:
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07628518.
- CVE-2023-20676 has been assigned by
securi[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
MediaTek, Inc. - MT5221, MT6781, MT6789, MT6833, MT6855, MT6877, MT6879, MT6895, MT6983, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8168, MT8169, MT8175, MT8185, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8675, MT8695, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798 version Android 11.0, 12.0, 13.0 / Yocto 3.1, 3.3, 4.0 / Linux-4.19 (for MT5221, MT7663, MT7668, MT7902 and MT7921 chipsets only)
CVSS3 Score: 4.4 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | HIGH | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
April 2023 | corp.mediatek.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Android | 11.0 | All | All | All | |
Operating System | Android | 12.0 | All | All | All | |
Operating System | Android | 13.0 | All | All | All | |
Operating System | Linux | Linux Kernel | 4.19 | All | All | All |
Hardware
| Mediatek | Mt5221 | - | All | All | All |
Hardware
| Mediatek | Mt6781 | - | All | All | All |
Hardware
| Mediatek | Mt6789 | - | All | All | All |
Hardware
| Mediatek | Mt6833 | - | All | All | All |
Hardware
| Mediatek | Mt6855 | - | All | All | All |
Hardware
| Mediatek | Mt6877 | - | All | All | All |
Hardware
| Mediatek | Mt6879 | - | All | All | All |
Hardware
| Mediatek | Mt6895 | - | All | All | All |
Hardware
| Mediatek | Mt6983 | - | All | All | All |
Hardware
| Mediatek | Mt7663 | - | All | All | All |
Hardware
| Mediatek | Mt7668 | - | All | All | All |
Hardware
| Mediatek | Mt7902 | - | All | All | All |
Hardware
| Mediatek | Mt7921 | - | All | All | All |
Hardware
| Mediatek | Mt8167s | - | All | All | All |
Hardware
| Mediatek | Mt8168 | - | All | All | All |
Hardware
| Mediatek | Mt8169 | - | All | All | All |
Hardware
| Mediatek | Mt8175 | - | All | All | All |
Hardware
| Mediatek | Mt8185 | - | All | All | All |
Hardware
| Mediatek | Mt8362a | - | All | All | All |
Hardware
| Mediatek | Mt8365 | - | All | All | All |
Hardware
| Mediatek | Mt8385 | - | All | All | All |
Hardware
| Mediatek | Mt8518 | - | All | All | All |
Hardware
| Mediatek | Mt8532 | - | All | All | All |
Hardware
| Mediatek | Mt8675 | - | All | All | All |
Hardware
| Mediatek | Mt8695 | - | All | All | All |
Hardware
| Mediatek | Mt8766 | - | All | All | All |
Hardware
| Mediatek | Mt8768 | - | All | All | All |
Hardware
| Mediatek | Mt8771 | - | All | All | All |
Hardware
| Mediatek | Mt8781 | - | All | All | All |
Hardware
| Mediatek | Mt8786 | - | All | All | All |
Hardware
| Mediatek | Mt8788 | - | All | All | All |
Hardware
| Mediatek | Mt8789 | - | All | All | All |
Hardware
| Mediatek | Mt8791t | - | All | All | All |
Hardware
| Mediatek | Mt8797 | - | All | All | All |
Hardware
| Mediatek | Mt8798 | - | All | All | All |
Operating System | Yoctoproject | Yocto | 3.1 | All | All | All |
Operating System | Yoctoproject | Yocto | 3.3 | All | All | All |
Operating System | Yoctoproject | Yocto | 4.0 | All | All | All |
- cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*:
- cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8169:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*:
- cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*:
- cpe:2.3:o:yoctoproject:yocto:3.1:*:*:*:*:*:*:*:
- cpe:2.3:o:yoctoproject:yocto:3.3:*:*:*:*:*:*:*:
- cpe:2.3:o:yoctoproject:yocto:4.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-20676 : In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to… twitter.com/i/web/status/1… | 2023-04-06 18:14:53 |
![]() |
CVE-2023-20676 | 2023-04-06 19:39:33 |