CVE-2021-40148

In Modem EMM, there is a possible information disclosure due to a missing data encryption. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00716585; Issue ID: ALPS05886933.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:mediatek:l9:*:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt3967:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*

History

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-311 CWE-319

14 Jan 2022, 16:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-311
CPE cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:l9:*:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt3967:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
First Time Mediatek mt6762d
Mediatek mt6883
Mediatek l9
Mediatek mt6763
Mediatek mt6880
Mediatek mt6885
Mediatek mt8791
Mediatek mt6891
Mediatek mt8766
Mediatek mt8666
Mediatek mt6769t
Mediatek mt8786
Mediatek mt6875
Mediatek mt6785
Mediatek mt6781
Mediatek mt6785t
Mediatek mt6768
Mediatek mt6762
Mediatek mt6877
Mediatek mt6875t
Mediatek lr12a
Mediatek mt6765t
Mediatek
Mediatek mt6855
Mediatek mt6761
Mediatek lr11
Mediatek mt8771
Mediatek mt6767
Mediatek mt6779
Mediatek mt2731
Mediatek mt6297
Mediatek mt6771
Mediatek mt6762m
Mediatek mt6853
Mediatek lr13
Mediatek mt8768
Mediatek mt6739
Mediatek mt8797
Mediatek mt6783
Mediatek mt6893
Mediatek mt6765
Mediatek mt6889
Mediatek mt8788
Mediatek lr12
Mediatek mt6873
Mediatek mt6769
Mediatek mt2735
Mediatek mt3967
Mediatek mt6769z
Mediatek mt8765
Mediatek mt8675
Mediatek nr15
Mediatek mt6890
Mediatek mt6833
References (MISC) https://corp.mediatek.com/product-security-bulletin/January-2022 - (MISC) https://corp.mediatek.com/product-security-bulletin/January-2022 - Vendor Advisory

04 Jan 2022, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-04 16:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-40148

Mitre link : CVE-2021-40148

CVE.ORG link : CVE-2021-40148


JSON object : View

Products Affected

mediatek

  • lr12a
  • mt8771
  • mt6771
  • mt6781
  • mt6877
  • mt3967
  • mt6765
  • mt6739
  • mt6769z
  • mt6785t
  • mt6873
  • mt8786
  • mt6785
  • lr12
  • mt6768
  • mt6875t
  • mt6783
  • mt6763
  • mt6833
  • lr11
  • mt6875
  • mt6762d
  • mt6889
  • mt6883
  • mt6762
  • nr15
  • mt6765t
  • mt8666
  • mt6779
  • l9
  • mt6297
  • mt6761
  • mt6769t
  • mt6853
  • mt8788
  • mt6762m
  • mt2735
  • mt6885
  • mt6855
  • mt6767
  • mt6891
  • mt8768
  • mt8765
  • mt6893
  • mt8791
  • mt8675
  • mt6769
  • mt2731
  • mt6890
  • mt6880
  • mt8797
  • lr13
  • mt8766
CWE
CWE-319

Cleartext Transmission of Sensitive Information