SB2023020726 - Multiple vulnerabilities in MediaTek Chipsets



SB2023020726 - Multiple vulnerabilities in MediaTek Chipsets

Published: February 7, 2023

Security Bulletin ID SB2023020726
Severity
Medium
Patch available
YES
Number of vulnerabilities 22
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 5% Low 95%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 22 secuirty vulnerabilities.


1) Race condition (CVE-ID: CVE-2023-20607)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in ccu. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.


2) Out-of-bounds read (CVE-ID: CVE-2023-20606)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in apusys. A local user can trigger out-of-bounds read error and read contents of memory on the system.


3) Out-of-bounds read (CVE-ID: CVE-2023-20605)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in keyinstall. A local user can trigger out-of-bounds read error and read contents of memory on the system.


4) Out-of-bounds write (CVE-ID: CVE-2023-20604)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in ged. A local user can trigger out-of-bounds write and execute arbitrary code on the target system with elevated privileges.


5) Out-of-bounds write (CVE-ID: CVE-2023-20602)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in ged. A local user can trigger out-of-bounds write and execute arbitrary code on the target system with elevated privileges.


6) Use-after-free (CVE-ID: CVE-2023-20608)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in display drm. A local user can gain elevated privileges on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


7) Out-of-bounds read (CVE-ID: CVE-2023-20609)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in ccu. A local user can trigger out-of-bounds read error and read contents of memory on the system.


8) Race condition (CVE-ID: CVE-2023-20610)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in display drm. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.


9) Use-after-free (CVE-ID: CVE-2023-20611)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in gpu. A local user can gain elevated privileges on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


10) Out-of-bounds write (CVE-ID: CVE-2023-20612)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in ril. A local user can trigger out-of-bounds write and execute arbitrary code on the target system with elevated privileges.


11) Out-of-bounds write (CVE-ID: CVE-2023-20613)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in ril. A local user can trigger out-of-bounds write and execute arbitrary code on the target system with elevated privileges.


12) Out-of-bounds write (CVE-ID: CVE-2023-20614)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in ril. A local user can trigger out-of-bounds write and execute arbitrary code on the target system with elevated privileges.


13) Out-of-bounds write (CVE-ID: CVE-2023-20615)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in ril. A local user can trigger out-of-bounds write and execute arbitrary code on the target system with elevated privileges.


14) Type Confusion (CVE-ID: CVE-2023-20616)

The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to a type confusion error in ion. A local user can pass specially crafted data to the application, trigger a type confusion error and gain elevated privileges on the target system.


15) Out-of-bounds read (CVE-ID: CVE-2023-20618)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in vcu. A local user can trigger out-of-bounds read error and read contents of memory on the system, leading to privilege escalation.


16) Use-after-free (CVE-ID: CVE-2023-20619)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in vcu. A local user can gain elevated privileges on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


17) Race condition (CVE-ID: CVE-2022-32642)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in ccd. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.


18) Use-after-free (CVE-ID: CVE-2022-32643)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in ccd. A local user can gain elevated privileges on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


19) Input validation error (CVE-ID: CVE-2022-32654)

The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to incorrect error handling in Wi-Fi driver. A local user can pass specially crafted input to the application and gain elevated privileges on the target system.


20) Input validation error (CVE-ID: CVE-2022-32655)

The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to incorrect error handling in Wi-Fi driver. A local user can pass specially crafted input to the application and gain elevated privileges on the target system.


21) Input validation error (CVE-ID: CVE-2022-32656)

The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to incorrect error handling in Wi-Fi driver. A local user can pass specially crafted input to the application and gain elevated privileges on the target system.


22) NULL pointer dereference (CVE-ID: CVE-2022-32663)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in Wi-Fi driver. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.