In Wi-Fi, there is a possible low throughput due to misrepresentation of critical information. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220829014; Issue ID: GN20220829014.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/July-2023 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
History
07 Jul 2023, 21:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | NVD-CWE-Other | |
First Time |
Mediatek mt7916 Firmware
Mediatek mt7615 Firmware Mediatek mt7981 Firmware Mediatek mt7986 Firmware Mediatek mt8365 Mediatek mt7613 Firmware Mediatek mt7603 Firmware Mediatek mt7915 Mediatek mt7915 Firmware Mediatek mt7622 Mediatek mt7629 Mediatek mt7628 Mediatek mt7603 Mediatek mt7615 Mediatek mt7628 Firmware Mediatek mt7916 Mediatek mt7622 Firmware Linuxfoundation Mediatek mt7629 Firmware Linuxfoundation yocto Mediatek mt7986 Mediatek mt8365 Firmware Mediatek mt7613 Mediatek mt7981 Mediatek |
|
References | (MISC) https://corp.mediatek.com/product-security-bulletin/July-2023 - Vendor Advisory | |
CPE | cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7629_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7628_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7613_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7615_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7916_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7986_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7915_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7981_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt8365_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7603_firmware:7.6.6.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:mt7622_firmware:7.6.6.0:*:*:*:*:*:*:* |
04 Jul 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-04 02:15
Updated : 2023-12-10 15:01
NVD link : CVE-2022-32666
Mitre link : CVE-2022-32666
CVE.ORG link : CVE-2022-32666
JSON object : View
Products Affected
mediatek
- mt7615
- mt7615_firmware
- mt7986_firmware
- mt7981_firmware
- mt7915_firmware
- mt7916_firmware
- mt7613_firmware
- mt7613
- mt8365
- mt7622_firmware
- mt7629
- mt7603
- mt8365_firmware
- mt7915
- mt7622
- mt7916
- mt7986
- mt7628
- mt7628_firmware
- mt7629_firmware
- mt7981
- mt7603_firmware
linuxfoundation
- yocto
CWE