CVE-2023-20811

In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*

History

09 Aug 2023, 17:51

Type Values Removed Values Added
References (MISC) https://corp.mediatek.com/product-security-bulletin/August-2023 - (MISC) https://corp.mediatek.com/product-security-bulletin/August-2023 - Vendor Advisory
CPE cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*
First Time Mediatek mt9686
Mediatek mt9685
Mediatek mt9256
Mediatek mt5221
Mediatek mt9611
Mediatek mt9021
Mediatek mt9031
Mediatek mt9669
Mediatek mt9636
Mediatek mt9629
Mediatek mt9652
Mediatek mt9255
Mediatek mt9639
Mediatek mt9011
Mediatek mt9613
Mediatek mt9610
Mediatek mt9016
Mediatek mt9220
Mediatek mt9666
Mediatek mt9266
Mediatek mt9602
Mediatek mt9221
Mediatek mt9650
Mediatek mt9022
Mediatek mt5695
Mediatek mt9020
Mediatek mt9218
Mediatek mt9649
Mediatek mt9631
Mediatek mt9653
Google android
Mediatek mt9632
Mediatek mt9612
Mediatek mt9012
Mediatek mt9030
Mediatek mt9667
Mediatek mt9675
Mediatek mt9617
Mediatek mt9688
Mediatek mt9630
Mediatek mt9216
Mediatek mt9010
Mediatek mt5691
Mediatek mt9032
Mediatek mt9638
Mediatek mt9269
Linux
Mediatek mt9222
Mediatek mt9671
Mediatek mt9286
Mediatek mt9615
Mediatek mt5583
Linux linux Kernel
Mediatek mt9288
Mediatek mt9618
Google
Mediatek
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7
CWE CWE-787

07 Aug 2023, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-07 04:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-20811

Mitre link : CVE-2023-20811

CVE.ORG link : CVE-2023-20811


JSON object : View

Products Affected

mediatek

  • mt9669
  • mt9653
  • mt9016
  • mt9255
  • mt9650
  • mt9610
  • mt9010
  • mt5583
  • mt9602
  • mt9611
  • mt9615
  • mt9649
  • mt9666
  • mt9032
  • mt9630
  • mt5221
  • mt9629
  • mt9222
  • mt9632
  • mt9022
  • mt9256
  • mt9218
  • mt9639
  • mt9675
  • mt9266
  • mt9618
  • mt9652
  • mt9216
  • mt9288
  • mt9011
  • mt9031
  • mt9636
  • mt9020
  • mt9221
  • mt9617
  • mt9030
  • mt9667
  • mt9688
  • mt9269
  • mt9631
  • mt5691
  • mt9686
  • mt9685
  • mt9220
  • mt9638
  • mt9012
  • mt9286
  • mt5695
  • mt9612
  • mt9671
  • mt9613
  • mt9021

linux

  • linux_kernel

google

  • android
CWE
CWE-787

Out-of-bounds Write