The MediaTek Product Security Bulletin contains details of security vulnerabilities affecting MediaTek Smartphone, Tablet, AIoT, Smart display, Smart platform, OTT and Wi-Fi chipsets. Device OEMs have been notified of all the issues and the corresponding security patches for at least two months before publication.
The severity of the identified vulnerabilities was conducted based on the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).
The severity of the identified vulnerabilities was conducted based on the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).
Summary
Severity | CVEs |
---|---|
High | CVE-2023-20754, CVE-2023-20755 |
Medium | CVE-2023-20753, CVE-2023-20756, CVE-2023-20757, CVE-2023-20758, CVE-2023-20759, CVE-2023-20760, CVE-2023-20761, CVE-2023-20766, CVE-2023-20767, CVE-2023-20768, CVE-2023-20771, CVE-2023-20772, CVE-2023-20773, CVE-2023-20774, CVE-2023-20775, CVE-2023-20689, CVE-2023-20690, CVE-2023-20691, CVE-2023-20692, CVE-2023-20693, CVE-2022-32666, CVE-2023-20748 |
Details
CVE | CVE-2023-20754 |
---|---|
Title | Integer overflow or wraparound in keyinstall |
Severity | High |
Vulnerability Type | EoP |
CWE | CWE-190 Integer Overflow or Wraparound |
Description | In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797 |
Affected Software Versions | Android 11.0, 12.0, 13.0 |
CVE | CVE-2023-20755 |
---|---|
Title | Improper input validation in keyinstall |
Severity | High |
Vulnerability Type | EoP |
CWE | CWE-20 Improper Input Validation |
Description | In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797 |
Affected Software Versions | Android 11.0, 12.0, 13.0 |
CVE | CVE-2023-20753 |
---|---|
Title | Out-of-bounds write in rpmb |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797 |
Affected Software Versions | Android 11.0, 12.0, 13.0 |
CVE | CVE-2023-20756 |
---|---|
Title | Integer overflow or wraparound in keyinstall |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-190 Integer Overflow or Wraparound |
Description | In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797 |
Affected Software Versions | Android 12.0, 13.0 |
CVE | CVE-2023-20757 |
---|---|
Title | Improper input validation in cmdq |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-20 Improper Input Validation |
Description | In cmdq, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6739, MT6768, MT6771, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8786, MT8789, MT8797 |
Affected Software Versions | Android 12.0, 13.0 |
CVE | CVE-2023-20758 |
---|---|
Title | Improper input validation in cmdq |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CWE-20 Improper Input Validation |
Description | In cmdq, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6739, MT6768, MT6771, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8786, MT8789, MT8797 |
Affected Software Versions | Android 12.0, 13.0 |
CVE | CVE-2023-20759 |
---|---|
Title | Improper input validation in cmdq |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CWE-20 Improper Input Validation |
Description | In cmdq, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6739, MT6768, MT6771, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8786, MT8789, MT8797 |
Affected Software Versions | Android 12.0, 13.0 |
CVE | CVE-2023-20760 |
---|---|
Title | Improper input validation in apu |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-20 Improper Input Validation |
Description | In apu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6879, MT6895, MT6983, MT8195 |
Affected Software Versions | Android 12.0, 13.0 |
CVE | CVE-2023-20761 |
---|---|
Title | Improper input validation in ril |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-20 Improper Input Validation |
Description | In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797 |
Affected Software Versions | Android 12.0, 13.0 |
CVE | CVE-2023-20766 |
---|---|
Title | Improper input validation in gps |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-20 Improper Input Validation |
Description | In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6580, MT6735, MT6739, MT6753, MT6757, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6886, MT6891, MT6893, MT6895, MT6983, MT6985, MT8167, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797 |
Affected Software Versions | Android 11.0, 12.0, 13.0 |
CVE | CVE-2023-20767 |
---|---|
Title | Improper input validation in pqframework |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-20 Improper Input Validation |
Description | In pqframework, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6879, MT6886, MT6895, MT6983, MT6985, MT8167, MT8168, MT8195, MT8673 |
Affected Software Versions | Android 12.0, 13.0 |
CVE | CVE-2023-20768 |
---|---|
Title | Access of resource using incompatible type ('type confusion') in ion |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') |
Description | In ion, there is a possible out of bounds read due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6580, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8168, MT8195, MT8321, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8791T, MT8797 |
Affected Software Versions | Android 11.0, 12.0 |
CVE | CVE-2023-20771 |
---|---|
Title | Concurrent execution using shared resource with improper synchronization ('race condition') in display |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-662 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
Description | In display, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6580, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6785, MT8168, MT8781 |
Affected Software Versions | Android 12.0 |
CVE | CVE-2023-20772 |
---|---|
Title | Improper authentication in vow |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-287 Improper Authentication |
Description | In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8781, MT8791, MT8791T, MT8797 |
Affected Software Versions | Android 12.0, 13.0 |
CVE | CVE-2023-20773 |
---|---|
Title | Improper authentication in vow |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-287 Improper Authentication |
Description | In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8781, MT8791, MT8791T, MT8797 |
Affected Software Versions | Android 12.0, 13.0 |
CVE | CVE-2023-20774 |
---|---|
Title | Improper input validation in display |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-20 Improper Input Validation |
Description | In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6789, MT6835, MT6855, MT6886, MT6895, MT6983, MT6985, MT8195, MT8673, MT8781 |
Affected Software Versions | Android 12.0, 13.0 |
CVE | CVE-2023-20775 |
---|---|
Title | Buffer copy without checking size of input ('classic buffer overflow') in display |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
Description | In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6739, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6983, MT6985, MT6990, MT8168, MT8183, MT8195, MT8673, MT8781 |
Affected Software Versions | Android 12.0, 13.0 / OpenWrt 21.02 / RDKB 2022Q3 |
CVE | CVE-2023-20689 |
---|---|
Title | Integer overflow to buffer overflow in wlan |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CWE-680 Integer Overflow to Buffer Overflow |
Description | In wlan firmware, there is possible system crash due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6739, MT8167, MT8321, MT8365, MT8385, MT8666, MT8765, MT8788 |
Affected Software Versions | Android 11.0 / IOT-v23.0 (Yocto 4.0) |
CVE | CVE-2023-20690 |
---|---|
Title | Integer overflow to buffer overflow in wlan |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CWE-680 Integer Overflow to Buffer Overflow |
Description | In wlan firmware, there is possible system crash due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6739, MT8167, MT8168, MT8321, MT8365, MT8385, MT8666, MT8765, MT8788 |
Affected Software Versions | Android 11.0, 12.0 / IOT-v23.0 (Yocto 4.0) |
CVE | CVE-2023-20691 |
---|---|
Title | Integer overflow to buffer overflow in wlan |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CWE-680 Integer Overflow to Buffer Overflow |
Description | In wlan firmware, there is possible system crash due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6739, MT8167, MT8321, MT8365, MT8385, MT8666, MT8765, MT8788 |
Affected Software Versions | Android 11.0, 12.0 / IOT-v23.0 (Yocto 4.0) |
CVE | CVE-2023-20692 |
---|---|
Title | Null pointer dereference in wlan |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CWE-476 NULL Pointer Dereference |
Description | In wlan firmware, there is possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6739, MT8167, MT8168, MT8321, MT8365, MT8385, MT8666, MT8765, MT8788 |
Affected Software Versions | Android 11.0 / IOT-v23.0 (Yocto 4.0) |
CVE | CVE-2023-20693 |
---|---|
Title | Null pointer dereference in wlan |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CWE-477 NULL Pointer Dereference |
Description | In wlan firmware, there is possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6739, MT6895, MT6983, MT8167, MT8168, MT8195, MT8321, MT8365, MT8385, MT8666, MT8765, MT8781, MT8788 |
Affected Software Versions | Android 11.0, 12.0 / IOT-v23.0 (Yocto 4.0) |
CVE | CVE-2022-32666 |
---|---|
Title | User interface (ui) misrepresentation of critical information in Wi-Fi |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CW3-451 User Interface (UI) Misrepresentation of Critical Information |
Description | In Wi-Fi, there is a possible low throughput due to misrepresentation of critical information. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT7603, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915, MT7916, MT7981, MT7986, MT8365 |
Affected Software Versions | 7.6.6.0 / IOT-v23.0 (Yocto 4.0) |
CVE | CVE-2023-20748 |
---|---|
Title | Improper input validation in display |
Severity | Medium |
Vulnerability Type | ID |
CWE | CWE-20 Improper Input Validation |
Description | In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6879, MT6886, MT6895, MT6983, MT6985, MT8673, MT8781 |
Affected Software Versions | Android 12.0, 13.0 |
Vulnerability Type Definition
Abbreviation | Definition |
---|---|
RCE | Remote Code Execution |
EoP | Elevation of Privilege |
ID | Information Disclosure |
DoS | Denial of Service |
N/A | Classification not available |
Versions
Version | Date | Description |
1.0 | July 3, 2023 | Bulletin published. |
Notes
Information above is generated only at the time of creation of this Security Bulletin. The list of affected chipsets could be not complete. For any further information, device OEMs can reach your MediaTek contact person if needed.
If you want to report a security vulnerability in MediaTek chipsets or products, please go to Report Security Vulnerability page on MediaTek website.
If you want to report a security vulnerability in MediaTek chipsets or products, please go to Report Security Vulnerability page on MediaTek website.