Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3", "vulnerable": true}, {"criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mediatek:awus036nh:-:*:*:*:*:*:*:*", "matchCriteriaId": "23A5CF60-C9DD-487C-8ABA-325D7A73694F", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6630:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCC85BBB-5985-41A1-B19F-1C580C367B64", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", "matchCriteriaId": "12A1CB8F-3C1C-4374-8D46-23175D1174DE", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt7662t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3331F3A6-E176-4EA5-B253-D5B03945C2B6", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C79211-F064-499D-914E-0BACD038FBF4", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E400AB9-B82A-4449-8789-35112940270F", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt8362b:-:*:*:*:*:*:*:*", "matchCriteriaId": "739BE124-C307-41B2-8E92-C223FE67F88A", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071", "vulnerable": false}, {"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513."}, {"lang": "es", "value": "En Bluetooth, se presenta un posible bloqueo de la aplicaci\u00f3n debido a que bluetooth no maneja apropiadamente la recepci\u00f3n de m\u00faltiples LMP_host_connection_req. Esto podr\u00eda conllevar a una denegaci\u00f3n de servicio remota de bluetooth sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06198513; ID de Incidencia: ALPS06198513"}], "id": "CVE-2022-20021", "lastModified": "2024-11-21T06:41:57.907", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-01-04T16:15:10.600", "references": [{"source": "security@mediatek.com", "tags": ["Vendor Advisory"], "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"}], "sourceIdentifier": "security@mediatek.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}