In DA, there is a possible permission bypass due to an incorrect status check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355514; Issue ID: ALPS08355514.
References
| Link | Resource |
|---|---|
| https://corp.mediatek.com/product-security-bulletin/May-2024 | Vendor Advisory |
| https://corp.mediatek.com/product-security-bulletin/May-2024 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2024-05-06 03:15
Updated : 2025-05-05 16:57
NVD link : CVE-2023-32871
Mitre link : CVE-2023-32871
CVE.ORG link : CVE-2023-32871
JSON object : View
Products Affected
mediatek
- mt8781
- mt8195
- mt6897
- mt6833
- mt6886
- mt6885
- mt6855
- mt6739
- mt6789
- mt6985
- mt8167
- mt6835
- mt6990
- mt6890
- mt6889
- mt6980
- mt8185
- mt6883
- mt6895
- mt8791t
- mt8321
- mt6761
- mt6785
- mt6768
- mt8390
- mt6893
- mt8365
- mt8755
- mt8798
- mt8789
- mt2737
- mt6880
- mt8786
- mt8395
- mt6853
- mt8385
- mt8188
- mt6765
- mt8791
- mt8797
- mt6853t
- mt8167s
- mt8175
- mt8362a
- mt8766
- mt8765
- mt6771
- mt8168
- mt6989
- mt8173
- mt6983
- mt6879
- mt6873
- mt8775
- mt6877
- mt8788
- mt8768
- mt6781
- mt6779
linuxfoundation
- yocto
- android
openwrt
- openwrt
rdkcentral
- rdk-b
