In DA, there is a possible permission bypass due to an incorrect status check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355514; Issue ID: ALPS08355514.
History

Mon, 17 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Mediatek
Mediatek mt2737
Mediatek mt6739
Mediatek mt6761
Mediatek mt6765
Mediatek mt6768
Mediatek mt6771
Mediatek mt6779
Mediatek mt6781
Mediatek mt6785
Mediatek mt6789
Mediatek mt6833
Mediatek mt6835
Mediatek mt6853
Mediatek mt6853t
Mediatek mt6855
Mediatek mt6873
Mediatek mt6877
Mediatek mt6879
Mediatek mt6880
Mediatek mt6883
Mediatek mt6885
Mediatek mt6886
Mediatek mt6889
Mediatek mt6890
Mediatek mt6893
Mediatek mt6895
Mediatek mt6897
Mediatek mt6980
Mediatek mt6983
Mediatek mt6985
Mediatek mt6989
Mediatek mt6990
Mediatek mt8167
Mediatek mt8167s
Mediatek mt8168
Mediatek mt8173
Mediatek mt8175
Mediatek mt8185
Mediatek mt8188
Mediatek mt8195
Mediatek mt8321
Mediatek mt8362a
Mediatek mt8365
Mediatek mt8385
Mediatek mt8390
Mediatek mt8395
Mediatek mt8755
Mediatek mt8765
Mediatek mt8766
Mediatek mt8768
Mediatek mt8775
Mediatek mt8781
Mediatek mt8786
Mediatek mt8788
Mediatek mt8789
Mediatek mt8791
Mediatek mt8791t
Mediatek mt8797
Mediatek mt8798
CPEs cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*
Vendors & Products Mediatek
Mediatek mt2737
Mediatek mt6739
Mediatek mt6761
Mediatek mt6765
Mediatek mt6768
Mediatek mt6771
Mediatek mt6779
Mediatek mt6781
Mediatek mt6785
Mediatek mt6789
Mediatek mt6833
Mediatek mt6835
Mediatek mt6853
Mediatek mt6853t
Mediatek mt6855
Mediatek mt6873
Mediatek mt6877
Mediatek mt6879
Mediatek mt6880
Mediatek mt6883
Mediatek mt6885
Mediatek mt6886
Mediatek mt6889
Mediatek mt6890
Mediatek mt6893
Mediatek mt6895
Mediatek mt6897
Mediatek mt6980
Mediatek mt6983
Mediatek mt6985
Mediatek mt6989
Mediatek mt6990
Mediatek mt8167
Mediatek mt8167s
Mediatek mt8168
Mediatek mt8173
Mediatek mt8175
Mediatek mt8185
Mediatek mt8188
Mediatek mt8195
Mediatek mt8321
Mediatek mt8362a
Mediatek mt8365
Mediatek mt8385
Mediatek mt8390
Mediatek mt8395
Mediatek mt8755
Mediatek mt8765
Mediatek mt8766
Mediatek mt8768
Mediatek mt8775
Mediatek mt8781
Mediatek mt8786
Mediatek mt8788
Mediatek mt8789
Mediatek mt8791
Mediatek mt8791t
Mediatek mt8797
Mediatek mt8798
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: MediaTek

Published: 2024-05-06T02:51:52.075Z

Updated: 2025-03-17T17:02:28.221Z

Reserved: 2023-05-16T03:04:32.164Z

Link: CVE-2023-32871

cve-icon Vulnrichment

Updated: 2024-08-02T15:32:46.185Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-06T03:15:09.273

Modified: 2025-03-17T17:15:19.013

Link: CVE-2023-32871

cve-icon Redhat

No data.