CVE-2023-20738

In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645173.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:linuxfoundation:iot-yocto:22.2:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5836:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5838:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9000:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9023:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9687:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9902:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9932:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9952:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9972:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9982:-:*:*:*:*:*:*:*

History

07 Jan 2025, 22:15

Type Values Removed Values Added
References (MISC) https://corp.mediatek.com/product-security-bulletin/June-2023 - Vendor Advisory () https://corp.mediatek.com/product-security-bulletin/June-2023 - Vendor Advisory

09 Jun 2023, 03:54

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7
CPE cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9000:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9023:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9982:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9687:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5836:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9952:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9932:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:iot-yocto:22.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5838:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9902:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9972:-:*:*:*:*:*:*:*
First Time Mediatek mt6779
Mediatek mt6877
Mediatek mt8195
Mediatek mt8395
Mediatek mt5836
Mediatek mt9000
Mediatek mt6789
Mediatek
Mediatek mt6883
Linuxfoundation
Mediatek mt8786
Mediatek mt9902
Mediatek mt6893
Mediatek mt6769
Mediatek mt8175
Mediatek mt6768
Mediatek mt9025
Mediatek mt9679
Mediatek mt6785
Mediatek mt8673
Google
Mediatek mt5838
Mediatek mt5696
Mediatek mt6781
Mediatek mt8797
Mediatek mt9015
Mediatek mt6885
Mediatek mt9932
Linuxfoundation yocto
Mediatek mt6873
Mediatek mt9972
Mediatek mt6875
Mediatek mt9653
Mediatek mt6889
Mediatek mt9649
Mediatek mt9687
Mediatek mt8781
Mediatek mt9023
Mediatek mt9689
Mediatek mt9982
Mediatek mt6891
Mediatek mt6853
Mediatek mt6853t
Mediatek mt8791t
Mediatek mt6833
Mediatek mt9952
Mediatek mt8789
Linuxfoundation iot-yocto
Mediatek mt8168
Mediatek mt8365
Google android
Mediatek mt9618
CWE CWE-787
References (MISC) https://corp.mediatek.com/product-security-bulletin/June-2023 - (MISC) https://corp.mediatek.com/product-security-bulletin/June-2023 - Vendor Advisory

06 Jun 2023, 13:36

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-06 13:15

Updated : 2025-01-07 22:15


NVD link : CVE-2023-20738

Mitre link : CVE-2023-20738


JSON object : View

Products Affected

mediatek

  • mt8789
  • mt9982
  • mt6833
  • mt9679
  • mt8786
  • mt9649
  • mt6789
  • mt9618
  • mt6769
  • mt8195
  • mt9023
  • mt9687
  • mt6889
  • mt8791t
  • mt6893
  • mt8175
  • mt9025
  • mt9689
  • mt6873
  • mt8797
  • mt9932
  • mt6781
  • mt9015
  • mt8365
  • mt8168
  • mt8781
  • mt9952
  • mt5696
  • mt6883
  • mt6785
  • mt6875
  • mt9902
  • mt6768
  • mt8673
  • mt9000
  • mt8395
  • mt6885
  • mt5836
  • mt9972
  • mt9653
  • mt5838
  • mt6891
  • mt6779
  • mt6853t
  • mt6877
  • mt6853

linuxfoundation

  • yocto
  • iot-yocto

google

  • android
CWE
CWE-787

Out-of-bounds Write