Search criteria

45 vulnerabilities found for lr12a by mediatek

VAR-202511-1774

Vulnerability from variot - Updated: 2025-11-20 23:28

In Modem, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672601; Issue ID: MSV-4623.

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202511-1774",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr17r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr17",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20727"
      }
    ]
  },
  "cve": "CVE-2025-20727",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.6,
            "id": "CVE-2025-20727",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2025-20727",
            "trust": 1.0,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20727"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Modem, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672601; Issue ID: MSV-4623.",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20727"
      }
    ],
    "trust": 1.0
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2025-20727",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20727"
      }
    ]
  },
  "id": "VAR-202511-1774",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.3333333266666667
  },
  "last_update_date": "2025-11-20T23:28:09.740000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20727"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.0,
        "url": "https://corp.mediatek.com/product-security-bulletin/november-2025"
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20727"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2025-20727"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-11-04T07:15:34.540000",
        "db": "NVD",
        "id": "CVE-2025-20727"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-11-05T18:40:42.667000",
        "db": "NVD",
        "id": "CVE-2025-20727"
      }
    ]
  }
}

VAR-202511-1256

Vulnerability from variot - Updated: 2025-11-20 23:10

In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672598; Issue ID: MSV-4622.

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202511-1256",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr17r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr17",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20726"
      }
    ]
  },
  "cve": "CVE-2025-20726",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.6,
            "id": "CVE-2025-20726",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2025-20726",
            "trust": 1.0,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20726"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672598; Issue ID: MSV-4622.",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20726"
      }
    ],
    "trust": 1.0
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2025-20726",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20726"
      }
    ]
  },
  "id": "VAR-202511-1256",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.3333333266666667
  },
  "last_update_date": "2025-11-20T23:10:23.896000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-122",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20726"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.0,
        "url": "https://corp.mediatek.com/product-security-bulletin/november-2025"
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20726"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2025-20726"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-11-04T07:15:34.037000",
        "db": "NVD",
        "id": "CVE-2025-20726"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-11-05T17:16:04.053000",
        "db": "NVD",
        "id": "CVE-2025-20726"
      }
    ]
  }
}

VAR-202511-0769

Vulnerability from variot - Updated: 2025-11-19 23:11

In ims service, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01671924; Issue ID: MSV-4620.

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202511-0769",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20725"
      }
    ]
  },
  "cve": "CVE-2025-20725",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.6,
            "id": "CVE-2025-20725",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2025-20725",
            "trust": 1.0,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20725"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In ims service, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01671924; Issue ID: MSV-4620.",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20725"
      }
    ],
    "trust": 1.0
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2025-20725",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20725"
      }
    ]
  },
  "id": "VAR-202511-0769",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.3333333266666667
  },
  "last_update_date": "2025-11-19T23:11:56.226000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20725"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.0,
        "url": "https://corp.mediatek.com/product-security-bulletin/november-2025"
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20725"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2025-20725"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-11-04T07:15:32.113000",
        "db": "NVD",
        "id": "CVE-2025-20725"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-11-05T17:16:11.350000",
        "db": "NVD",
        "id": "CVE-2025-20725"
      }
    ]
  }
}

VAR-202506-0169

Vulnerability from variot - Updated: 2025-07-16 23:04

In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739. LR12A , LR13 , NR15 There is a recursion control vulnerability in multiple MediaTek products, including:Service operation interruption (DoS) It may be in a state

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202506-0169",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr13",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr17",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr17r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr15",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr17",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr16",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr13",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr17r",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-008686"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20678"
      }
    ]
  },
  "cve": "CVE-2025-20678",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2025-20678",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2025-008686",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2025-20678",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "OTHER",
            "id": "JVNDB-2025-008686",
            "trust": 0.8,
            "value": "High"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-008686"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20678"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739. LR12A , LR13 , NR15 There is a recursion control vulnerability in multiple MediaTek products, including:Service operation interruption (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20678"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-008686"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2025-20678",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-008686",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-008686"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20678"
      }
    ]
  },
  "id": "VAR-202506-0169",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.32291666
  },
  "last_update_date": "2025-07-16T23:04:17.843000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-674",
        "trust": 1.0
      },
      {
        "problemtype": "Inappropriate recursive control (CWE-674) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-008686"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20678"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://corp.mediatek.com/product-security-bulletin/june-2025"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2025-20678"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-008686"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20678"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-008686"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20678"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-07-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2025-008686"
      },
      {
        "date": "2025-06-02T03:15:25.230000",
        "db": "NVD",
        "id": "CVE-2025-20678"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-07-14T03:09:00",
        "db": "JVNDB",
        "id": "JVNDB-2025-008686"
      },
      {
        "date": "2025-07-10T17:38:15.050000",
        "db": "NVD",
        "id": "CVE-2025-20678"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Recursive control vulnerability in multiple MediaTek products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-008686"
      }
    ],
    "trust": 0.8
  }
}

VAR-202407-1709

Vulnerability from variot - Updated: 2025-05-30 23:10

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297807; Issue ID: MSV-1482. media tech's LR12A Exists in a buffer error vulnerability.Service operation interruption (DoS) It may be in a state

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202407-1709",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024310"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20077"
      }
    ]
  },
  "cve": "CVE-2024-20077",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2024-20077",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2024-024310",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2024-20077",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "OTHER",
            "id": "JVNDB-2024-024310",
            "trust": 0.8,
            "value": "High"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024310"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20077"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297807; Issue ID: MSV-1482. media tech\u0027s LR12A Exists in a buffer error vulnerability.Service operation interruption (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-20077"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024310"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-20077",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024310",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024310"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20077"
      }
    ]
  },
  "id": "VAR-202407-1709",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.29166666
  },
  "last_update_date": "2025-05-30T23:10:40.843000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.0
      },
      {
        "problemtype": "Buffer error (CWE-119) [ others ]",
        "trust": 0.8
      },
      {
        "problemtype": " Buffer error (CWE-119) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024310"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20077"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://corp.mediatek.com/product-security-bulletin/july-2024"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-20077"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024310"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20077"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024310"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20077"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-05-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-024310"
      },
      {
        "date": "2024-07-01T05:15:04.133000",
        "db": "NVD",
        "id": "CVE-2024-20077"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-05-29T02:36:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-024310"
      },
      {
        "date": "2025-05-28T20:12:30.680000",
        "db": "NVD",
        "id": "CVE-2024-20077"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "media tech\u0027s \u00a0LR12A\u00a0 Buffer error vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024310"
      }
    ],
    "trust": 0.8
  }
}

VAR-202407-1872

Vulnerability from variot - Updated: 2025-05-30 23:00

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID: MSV-1481. media tech's LR12A Exists in a buffer error vulnerability.Service operation interruption (DoS) It may be in a state

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202407-1872",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024323"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20076"
      }
    ]
  },
  "cve": "CVE-2024-20076",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2024-20076",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2024-024323",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2024-20076",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "OTHER",
            "id": "JVNDB-2024-024323",
            "trust": 0.8,
            "value": "High"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024323"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20076"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID: MSV-1481. media tech\u0027s LR12A Exists in a buffer error vulnerability.Service operation interruption (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-20076"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024323"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-20076",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024323",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024323"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20076"
      }
    ]
  },
  "id": "VAR-202407-1872",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.29166666
  },
  "last_update_date": "2025-05-30T23:00:47.018000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.0
      },
      {
        "problemtype": "Buffer error (CWE-119) [ others ]",
        "trust": 0.8
      },
      {
        "problemtype": " Buffer error (CWE-119) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024323"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20076"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://corp.mediatek.com/product-security-bulletin/july-2024"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-20076"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024323"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20076"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024323"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20076"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-05-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-024323"
      },
      {
        "date": "2024-07-01T05:15:03.957000",
        "db": "NVD",
        "id": "CVE-2024-20076"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-05-29T03:26:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-024323"
      },
      {
        "date": "2025-05-28T20:12:55.060000",
        "db": "NVD",
        "id": "CVE-2024-20076"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "media tech\u0027s \u00a0LR12A\u00a0 Buffer error vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-024323"
      }
    ],
    "trust": 0.8
  }
}

VAR-202505-0190

Vulnerability from variot - Updated: 2025-05-13 23:25

In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741. LR12A , LR13 , NR15 There are vulnerabilities in the encryption strength of multiple MediaTek products, including:Information may be obtained

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202505-0190",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nr17",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr13",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr17r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr17r",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr15",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr13",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr17",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-004393"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20667"
      }
    ]
  },
  "cve": "CVE-2025-20667",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2025-20667",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 2.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2025-20667",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2025-20667",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2025-20667",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2025-20667",
            "trust": 0.8,
            "value": "High"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-004393"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20667"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20667"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741. LR12A , LR13 , NR15 There are vulnerabilities in the encryption strength of multiple MediaTek products, including:Information may be obtained",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2025-20667"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-004393"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2025-20667",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-004393",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-004393"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20667"
      }
    ]
  },
  "id": "VAR-202505-0190",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.32291666
  },
  "last_update_date": "2025-05-13T23:25:24.609000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-326",
        "trust": 1.0
      },
      {
        "problemtype": "Inappropriate cryptographic strength (CWE-326) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-004393"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20667"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://corp.mediatek.com/product-security-bulletin/may-2025"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2025-20667"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-004393"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20667"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-004393"
      },
      {
        "db": "NVD",
        "id": "CVE-2025-20667"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-05-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2025-004393"
      },
      {
        "date": "2025-05-05T03:15:22.053000",
        "db": "NVD",
        "id": "CVE-2025-20667"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-05-07T07:59:00",
        "db": "JVNDB",
        "id": "JVNDB-2025-004393"
      },
      {
        "date": "2025-05-12T18:15:44.520000",
        "db": "NVD",
        "id": "CVE-2025-20667"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Encryption vulnerability in multiple MediaTek products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-004393"
      }
    ],
    "trust": 0.8
  }
}

VAR-202211-0490

Vulnerability from variot - Updated: 2025-05-02 23:05

In Modem 4G RRC, there is a possible system crash due to improper input validation. This could lead to remote denial of service, when concatenating improper SIB12 (CMAS message), with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00867883; Issue ID: ALPS07274118. LR12A , LR13 , NR15 A reachable assertion vulnerability exists in several MediaTek products.Service operation interruption (DoS) It may be in a state

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0490",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr13",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr15",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr13",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-020614"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-26446"
      }
    ]
  },
  "cve": "CVE-2022-26446",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2022-26446",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 2.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2022-26446",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2022-26446",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2022-26446",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2022-26446",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202211-2385",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-020614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-2385"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-26446"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-26446"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Modem 4G RRC, there is a possible system crash due to improper input validation. This could lead to remote denial of service, when concatenating improper SIB12 (CMAS message), with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00867883; Issue ID: ALPS07274118. LR12A , LR13 , NR15 A reachable assertion vulnerability exists in several MediaTek products.Service operation interruption (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-26446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-020614"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-26446",
        "trust": 3.2
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-020614",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-2385",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-020614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-2385"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-26446"
      }
    ]
  },
  "id": "VAR-202211-0490",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.32291666
  },
  "last_update_date": "2025-05-02T23:05:44.994000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "MediaTek Fixes for chip security vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213789"
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-2385"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-617",
        "trust": 1.0
      },
      {
        "problemtype": "Reachable assertions (CWE-617) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-020614"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-26446"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "https://corp.mediatek.com/product-security-bulletin/november-2022"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26446"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-26446/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-020614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-2385"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-26446"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-020614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-2385"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-26446"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-11-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-020614"
      },
      {
        "date": "2022-11-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202211-2385"
      },
      {
        "date": "2022-11-08T21:15:11.423000",
        "db": "NVD",
        "id": "CVE-2022-26446"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-11-02T08:06:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-020614"
      },
      {
        "date": "2022-11-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202211-2385"
      },
      {
        "date": "2025-05-01T19:15:49.940000",
        "db": "NVD",
        "id": "CVE-2022-26446"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-2385"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Reachable assertion vulnerability in multiple MediaTek products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-020614"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-2385"
      }
    ],
    "trust": 0.6
  }
}

VAR-202404-1690

Vulnerability from variot - Updated: 2025-04-25 23:14

In modem protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01240012; Issue ID: MSV-1215. LR12A , LR13 , NR15 A number of MediaTek products, including the following, contain out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202404-1690",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr17",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr13",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr13",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr17",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr15",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr16",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-022795"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20039"
      }
    ]
  },
  "cve": "CVE-2024-20039",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2024-20039",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2024-022795",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2024-20039",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "OTHER",
            "id": "JVNDB-2024-022795",
            "trust": 0.8,
            "value": "High"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-022795"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20039"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In modem protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01240012; Issue ID: MSV-1215. LR12A , LR13 , NR15 A number of MediaTek products, including the following, contain out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-20039"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-022795"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-20039",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-022795",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-022795"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20039"
      }
    ]
  },
  "id": "VAR-202404-1690",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.32291666
  },
  "last_update_date": "2025-04-25T23:14:11.828000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      },
      {
        "problemtype": "Out-of-bounds writing (CWE-787) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-022795"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20039"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://corp.mediatek.com/product-security-bulletin/april-2024"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-20039"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-022795"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20039"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-022795"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20039"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-04-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-022795"
      },
      {
        "date": "2024-04-01T03:15:07.780000",
        "db": "NVD",
        "id": "CVE-2024-20039"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-04-24T01:20:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-022795"
      },
      {
        "date": "2025-04-23T13:48:41.747000",
        "db": "NVD",
        "id": "CVE-2024-20039"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Out-of-bounds write vulnerability in multiple MediaTek products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-022795"
      }
    ],
    "trust": 0.8
  }
}

VAR-202501-0708

Vulnerability from variot - Updated: 2025-04-25 01:46

In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01412526; Issue ID: MSV-2018. LR12A , LR13 , NR15 Multiple MediaTek products contain vulnerabilities related to the deserialization of untrusted data.Service operation interruption (DoS) It may be in a state

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202501-0708",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr17",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr13",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr15",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr17",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr13",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20150"
      }
    ]
  },
  "cve": "CVE-2024-20150",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2024-20150",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2025-003848",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2024-20150",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "OTHER",
            "id": "JVNDB-2025-003848",
            "trust": 0.8,
            "value": "High"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20150"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01412526; Issue ID: MSV-2018. LR12A , LR13 , NR15 Multiple MediaTek products contain vulnerabilities related to the deserialization of untrusted data.Service operation interruption (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-20150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-003848"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-20150",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-003848",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20150"
      }
    ]
  },
  "id": "VAR-202501-0708",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.32291666
  },
  "last_update_date": "2025-04-25T01:46:13.466000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-502",
        "trust": 1.0
      },
      {
        "problemtype": "Deserialization of untrusted data (CWE-502) [NVD evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": " Deserialization of untrusted data (CWE-502) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20150"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://corp.mediatek.com/product-security-bulletin/january-2025"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-20150"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20150"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-20150"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-04-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2025-003848"
      },
      {
        "date": "2025-01-06T04:15:07.307000",
        "db": "NVD",
        "id": "CVE-2024-20150"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-04-23T01:23:00",
        "db": "JVNDB",
        "id": "JVNDB-2025-003848"
      },
      {
        "date": "2025-04-22T13:50:21.513000",
        "db": "NVD",
        "id": "CVE-2024-20150"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Untrusted Data Deserialization Vulnerability in Multiple MediaTek Products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2025-003848"
      }
    ],
    "trust": 0.8
  }
}

VAR-202201-0204

Vulnerability from variot - Updated: 2024-11-23 19:41

In Modem EMM, there is a possible information disclosure due to a missing data encryption. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00716585; Issue ID: ALPS05886933. plural MediaTek The product contains a vulnerability related to lack of encryption of sensitive data

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0204",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "lr11",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "l9",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": "*"
      },
      {
        "model": "lr12",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr13",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr11",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "l9",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr12",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr13",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr15",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002990"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40148"
      }
    ]
  },
  "cve": "CVE-2021-40148",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2021-40148",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-40148",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2021-40148",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-40148",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-40148",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202201-111",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-111"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40148"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Modem EMM, there is a possible information disclosure due to a missing data encryption. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00716585; Issue ID: ALPS05886933. plural MediaTek The product contains a vulnerability related to lack of encryption of sensitive data",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-40148"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002990"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-40148"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-40148",
        "trust": 3.3
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002990",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0094",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022010910",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-111",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-40148",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-40148"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-111"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40148"
      }
    ]
  },
  "id": "VAR-202201-0204",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.29166666
  },
  "last_update_date": "2024-11-23T19:41:16.783000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "January\u00a02022\u00a0Product\u00a0Security\u00a0Bulletin",
        "trust": 0.8,
        "url": "https://corp.mediatek.com/product-security-bulletin/January-2022"
      },
      {
        "title": "Google Android Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176897"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-111"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-319",
        "trust": 1.0
      },
      {
        "problemtype": "Lack of encryption of critical data (CWE-311) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002990"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40148"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://corp.mediatek.com/product-security-bulletin/january-2022"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40148"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2022-01-01"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-january-2022-37172"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0094"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022010910"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-40148"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-111"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40148"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2021-40148"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-111"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40148"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-01-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-40148"
      },
      {
        "date": "2023-02-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-002990"
      },
      {
        "date": "2022-01-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202201-111"
      },
      {
        "date": "2022-01-04T16:15:09.193000",
        "db": "NVD",
        "id": "CVE-2021-40148"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-01-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-40148"
      },
      {
        "date": "2023-02-02T02:11:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-002990"
      },
      {
        "date": "2022-01-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202201-111"
      },
      {
        "date": "2024-11-21T06:23:39.777000",
        "db": "NVD",
        "id": "CVE-2021-40148"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-111"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0MediaTek\u00a0 Vulnerability related to lack of encryption of critical data in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002990"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-111"
      }
    ],
    "trust": 0.6
  }
}

VAR-202308-3352

Vulnerability from variot - Updated: 2024-09-22 23:17

In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003. LR11 , LR12A , LR13 A number of MediaTek products, including the following, contain out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202308-3352",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nr17",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr13",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr11",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr15",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr11",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr17",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "nr16",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "lr13",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30e1\u30c7\u30a3\u30a2\u30c6\u30c3\u30af",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-013538"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-20819"
      }
    ]
  },
  "cve": "CVE-2023-20819",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2023-20819",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.8,
            "id": "CVE-2023-20819",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2023-20819",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2023-20819",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2023-20819",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2023-20819",
            "trust": 0.8,
            "value": "Critical"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-013538"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-20819"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-20819"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003. LR11 , LR12A , LR13 A number of MediaTek products, including the following, contain out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2023-20819"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-013538"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2023-20819",
        "trust": 2.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-013538",
        "trust": 0.8
      },
      {
        "db": "VULMON",
        "id": "CVE-2023-20819",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2023-20819"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-013538"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-20819"
      }
    ]
  },
  "id": "VAR-202308-3352",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.31666666
  },
  "last_update_date": "2024-09-22T23:17:41.982000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/N3vv/N3vv "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2023-20819"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      },
      {
        "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-013538"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-20819"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://corp.mediatek.com/product-security-bulletin/october-2023"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2023-20819"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/n3vv/n3vv"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2023-20819"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-013538"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-20819"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2023-20819"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-013538"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-20819"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-12-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2023-013538"
      },
      {
        "date": "2023-10-02T03:15:09.710000",
        "db": "NVD",
        "id": "CVE-2023-20819"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-12-21T03:07:00",
        "db": "JVNDB",
        "id": "JVNDB-2023-013538"
      },
      {
        "date": "2024-09-21T16:35:01.573000",
        "db": "NVD",
        "id": "CVE-2023-20819"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Out-of-bounds write vulnerability in multiple MediaTek products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-013538"
      }
    ],
    "trust": 0.8
  }
}

VAR-202311-0339

Vulnerability from variot - Updated: 2024-09-05 23:13

In modem CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction may be also needed for exploitation Patch ID: MOLY01138425; Issue ID: MOLY01138425 (MSV-862)

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202311-0339",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr17",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2023-32840"
      }
    ]
  },
  "cve": "CVE-2023-32840",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.6,
            "id": "CVE-2023-32840",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.5,
            "id": "CVE-2023-32840",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2023-32840",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2023-32840",
            "trust": 1.0,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2023-32840"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-32840"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In modem CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction may be also needed for exploitation Patch ID: MOLY01138425; Issue ID: MOLY01138425 (MSV-862)",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2023-32840"
      },
      {
        "db": "VULMON",
        "id": "CVE-2023-32840"
      }
    ],
    "trust": 0.99
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2023-32840",
        "trust": 1.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2023-32840",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2023-32840"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-32840"
      }
    ]
  },
  "id": "VAR-202311-0339",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.3333333266666667
  },
  "last_update_date": "2024-09-05T23:13:49.490000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2023-32840"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.1,
        "url": "https://corp.mediatek.com/product-security-bulletin/november-2023"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2023-32840"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-32840"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2023-32840"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-32840"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-11-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2023-32840"
      },
      {
        "date": "2023-11-06T04:15:08.097000",
        "db": "NVD",
        "id": "CVE-2023-32840"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-11-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2023-32840"
      },
      {
        "date": "2024-09-05T15:35:07.837000",
        "db": "NVD",
        "id": "CVE-2023-32840"
      }
    ]
  }
}

VAR-202207-0316

Vulnerability from variot - Updated: 2024-08-14 13:12

In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883. MediaTek Inc. is the world's fourth-largest foundry semiconductor company. It is in a leading position in the market of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with about 1.5 billion units a year End products with built-in MediaTek chips are available all over the world. Attackers can use this vulnerability to execute remote code

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0316",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "lr13",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr9",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr11",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-85337"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-20083"
      }
    ]
  },
  "cve": "CVE-2022-20083",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2022-20083",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.1,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2022-85337",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2022-20083",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2022-20083",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2022-85337",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202207-480",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2022-20083",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-85337"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-20083"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-480"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-20083"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883. MediaTek Inc. is the world\u0027s fourth-largest foundry semiconductor company. It is in a leading position in the market of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with about 1.5 billion units a year End products with built-in MediaTek chips are available all over the world. Attackers can use this vulnerability to execute remote code",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-20083"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-85337"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-20083"
      }
    ],
    "trust": 1.53
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-20083",
        "trust": 2.3
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-85337",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.3342",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022070825",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-480",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-20083",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-85337"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-20083"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-480"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-20083"
      }
    ]
  },
  "id": "VAR-202207-0316",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-85337"
      }
    ],
    "trust": 1.5898088022077919
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-85337"
      }
    ]
  },
  "last_update_date": "2024-08-14T13:12:04.748000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Google Android Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=200007"
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-480"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-20083"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "https://corp.mediatek.com/product-security-bulletin/july-2022"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-july-2022-38750"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-20083/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.3342"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022070825"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2022-07-01"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/787.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-85337"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-20083"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-480"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-20083"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-85337"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-20083"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-480"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-20083"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-09-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2022-85337"
      },
      {
        "date": "2022-07-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-20083"
      },
      {
        "date": "2022-07-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202207-480"
      },
      {
        "date": "2022-07-06T14:15:16.980000",
        "db": "NVD",
        "id": "CVE-2022-20083"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-12-06T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2022-85337"
      },
      {
        "date": "2022-07-14T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-20083"
      },
      {
        "date": "2022-07-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202207-480"
      },
      {
        "date": "2022-07-14T01:28:52.117000",
        "db": "NVD",
        "id": "CVE-2022-20083"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-480"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple MediaTek Chip Modem 2G/3G CC Out-of-Boundary Write Vulnerabilities",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-85337"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-480"
      }
    ],
    "trust": 0.6
  }
}

VAR-202207-0281

Vulnerability from variot - Updated: 2024-08-14 12:14

In Modem 2G RR, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighbouring cell size with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00810064; Issue ID: ALPS06641626. MediaTek Inc. is the world's fourth largest fab semiconductor company, with a leading position in mobile terminals, smart home applications, wireless connectivity technologies and IoT products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available worldwide. Attackers can use this vulnerability to perform remote code execution

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0281",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "lr13",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr16",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr9",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "nr15",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr11",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "lr12",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2731 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt2735 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6297 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6725 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6735 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6737 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6739 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6750s nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6755 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6757p nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6758 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6761 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762d nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6762m nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6763 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6765t nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6767 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6768 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769t nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6769z nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6771 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6775 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6779 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6781 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6783 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6785t nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6789 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6797 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6799 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6833 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6853 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6855 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6873 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6875 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6877 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6879 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6880 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6883 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6885 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6889 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6890 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6891 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6893 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6895 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt6983 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8666 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8667 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8675 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735a nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8735b nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8765 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8766 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8768 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8771 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8781 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8786 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8788 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8789 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8791 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 lr9",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 lr11",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 lr12",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 lr12a",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 lr13",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 nr15",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      },
      {
        "model": "mt8797 nr16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mediatek",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-21744"
      }
    ]
  },
  "cve": "CVE-2022-21744",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2022-21744",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.1,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2022-66250",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2022-21744",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2022-21744",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2022-66250",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202207-478",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2022-21744",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-21744"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-478"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-21744"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Modem 2G RR, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighbouring cell size with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00810064; Issue ID: ALPS06641626. MediaTek Inc. is the world\u0027s fourth largest fab semiconductor company, with a leading position in mobile terminals, smart home applications, wireless connectivity technologies and IoT products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available worldwide. Attackers can use this vulnerability to perform remote code execution",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-21744"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-21744"
      }
    ],
    "trust": 1.53
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-21744",
        "trust": 2.3
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-66250",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.3342",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022070825",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-478",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-21744",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-21744"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-478"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-21744"
      }
    ]
  },
  "id": "VAR-202207-0281",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      }
    ],
    "trust": 1.5898088022077919
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      }
    ]
  },
  "last_update_date": "2024-08-14T12:14:53.956000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Patch for Several MediaTek chips Modem 2G RR have out-of-bounds write vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/353611"
      },
      {
        "title": "Google Android Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=200005"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-478"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-21744"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "https://corp.mediatek.com/product-security-bulletin/july-2022"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-july-2022-38750"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-21744/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.3342"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022070825"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2022-07-01"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/787.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-21744"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-478"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-21744"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-21744"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-478"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-21744"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-09-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      },
      {
        "date": "2022-07-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-21744"
      },
      {
        "date": "2022-07-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202207-478"
      },
      {
        "date": "2022-07-06T14:15:17.027000",
        "db": "NVD",
        "id": "CVE-2022-21744"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-09-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      },
      {
        "date": "2022-07-14T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-21744"
      },
      {
        "date": "2022-07-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202207-478"
      },
      {
        "date": "2022-07-14T01:26:43.237000",
        "db": "NVD",
        "id": "CVE-2022-21744"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-478"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Several MediaTek chips Modem 2G RR have out-of-bounds write vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-66250"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-478"
      }
    ],
    "trust": 0.6
  }
}

CVE-2025-20727 (GCVE-0-2025-20727)

Vulnerability from nvd – Published: 2025-11-04 06:19 – Updated: 2025-11-05 04:55
VLAI?

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20727",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-04T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-05T04:55:35.978Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, NR15, NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672601; Issue ID: MSV-4623."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-04T06:19:40.087Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20727",
    "datePublished": "2025-11-04T06:19:40.087Z",
    "dateReserved": "2024-11-01T01:21:50.392Z",
    "dateUpdated": "2025-11-05T04:55:35.978Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-20726 (GCVE-0-2025-20726)

Vulnerability from nvd – Published: 2025-11-04 06:19 – Updated: 2025-11-05 04:55
VLAI?

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20726",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-04T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-05T04:55:36.771Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, NR15, NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672598; Issue ID: MSV-4622."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "CWE-122 Heap Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-04T06:19:41.827Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20726",
    "datePublished": "2025-11-04T06:19:41.827Z",
    "dateReserved": "2024-11-01T01:21:50.392Z",
    "dateUpdated": "2025-11-05T04:55:36.771Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-20725 (GCVE-0-2025-20725)

Vulnerability from nvd – Published: 2025-11-04 06:19 – Updated: 2025-11-05 04:55
VLAI?
Summary
In ims service, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01671924; Issue ID: MSV-4620.
CWE
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20725",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-04T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-05T04:55:37.570Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, NR15, NR16"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ims service, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01671924; Issue ID: MSV-4620."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-04T06:19:43.569Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20725",
    "datePublished": "2025-11-04T06:19:43.569Z",
    "dateReserved": "2024-11-01T01:21:50.392Z",
    "dateUpdated": "2025-11-05T04:55:37.570Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-20678 (GCVE-0-2025-20678)

Vulnerability from nvd – Published: 2025-06-02 02:29 – Updated: 2025-06-02 15:46
VLAI?

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20678",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-02T15:21:06.886934Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-02T15:46:17.386Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, LR13, NR15, NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-674",
              "description": "CWE-674 Uncontrolled Recursion",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-02T02:29:47.843Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20678",
    "datePublished": "2025-06-02T02:29:47.843Z",
    "dateReserved": "2024-11-01T01:21:50.371Z",
    "dateUpdated": "2025-06-02T15:46:17.386Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20667 (GCVE-0-2025-20667)

Vulnerability from nvd – Published: 2025-05-05 02:49 – Updated: 2025-05-12 17:50
VLAI?

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20667",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-12T17:50:38.812599Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-12T17:50:53.123Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8675, MT8676, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, LR13, NR15, NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-326",
              "description": "CWE-326 Inadequate Encryption Strength",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-05T02:49:11.742Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20667",
    "datePublished": "2025-05-05T02:49:11.742Z",
    "dateReserved": "2024-11-01T01:21:50.368Z",
    "dateUpdated": "2025-05-12T17:50:53.123Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20150 (GCVE-0-2024-20150)

Vulnerability from nvd – Published: 2025-01-06 03:17 – Updated: 2025-01-06 14:13
VLAI?

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20150",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T14:13:49.851498Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-06T14:13:53.673Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6880T, MT6880U, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8797, MT8798, MT8863",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, LR13, NR15, NR16, NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01412526; Issue ID: MSV-2018."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502 Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T03:17:56.513Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20150",
    "datePublished": "2025-01-06T03:17:56.513Z",
    "dateReserved": "2023-11-02T13:35:35.188Z",
    "dateUpdated": "2025-01-06T14:13:53.673Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20077 (GCVE-0-2024-20077)

Vulnerability from nvd – Published: 2024-07-01 03:18 – Updated: 2024-08-01 21:52
VLAI?
Summary
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297807; Issue ID: MSV-1482.
CWE
  • CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2731",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6763",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6767",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6771",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20077",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-01T14:17:39.850090Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-01T14:17:50.720Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.943Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2731, MT6739, MT6761, MT6762, MT6763, MT6765, MT6767, MT6768, MT6769, MT6771, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297807; Issue ID: MSV-1482."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-01T03:18:01.190Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20077",
    "datePublished": "2024-07-01T03:18:01.190Z",
    "dateReserved": "2023-11-02T13:35:35.172Z",
    "dateUpdated": "2024-08-01T21:52:31.943Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20076 (GCVE-0-2024-20076)

Vulnerability from nvd – Published: 2024-07-01 03:18 – Updated: 2024-08-01 21:52
VLAI?
Summary
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID: MSV-1481.
CWE
  • CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2731",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6763",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6767",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6771",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20076",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-01T14:13:20.468040Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-01T14:15:46.878Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.786Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2731, MT6739, MT6761, MT6762, MT6763, MT6765, MT6767, MT6768, MT6769, MT6771, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID: MSV-1481."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-01T03:18:02.941Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20076",
    "datePublished": "2024-07-01T03:18:02.941Z",
    "dateReserved": "2023-11-02T13:35:35.172Z",
    "dateUpdated": "2024-08-01T21:52:31.786Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20725 (GCVE-0-2025-20725)

Vulnerability from cvelistv5 – Published: 2025-11-04 06:19 – Updated: 2025-11-05 04:55
VLAI?
Summary
In ims service, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01671924; Issue ID: MSV-4620.
CWE
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20725",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-04T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-05T04:55:37.570Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, NR15, NR16"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ims service, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01671924; Issue ID: MSV-4620."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-04T06:19:43.569Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20725",
    "datePublished": "2025-11-04T06:19:43.569Z",
    "dateReserved": "2024-11-01T01:21:50.392Z",
    "dateUpdated": "2025-11-05T04:55:37.570Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-20726 (GCVE-0-2025-20726)

Vulnerability from cvelistv5 – Published: 2025-11-04 06:19 – Updated: 2025-11-05 04:55
VLAI?

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20726",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-04T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-05T04:55:36.771Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, NR15, NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672598; Issue ID: MSV-4622."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "CWE-122 Heap Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-04T06:19:41.827Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20726",
    "datePublished": "2025-11-04T06:19:41.827Z",
    "dateReserved": "2024-11-01T01:21:50.392Z",
    "dateUpdated": "2025-11-05T04:55:36.771Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-20727 (GCVE-0-2025-20727)

Vulnerability from cvelistv5 – Published: 2025-11-04 06:19 – Updated: 2025-11-05 04:55
VLAI?

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20727",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-04T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-05T04:55:35.978Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, NR15, NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672601; Issue ID: MSV-4623."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-04T06:19:40.087Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/November-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20727",
    "datePublished": "2025-11-04T06:19:40.087Z",
    "dateReserved": "2024-11-01T01:21:50.392Z",
    "dateUpdated": "2025-11-05T04:55:35.978Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-20678 (GCVE-0-2025-20678)

Vulnerability from cvelistv5 – Published: 2025-06-02 02:29 – Updated: 2025-06-02 15:46
VLAI?

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20678",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-02T15:21:06.886934Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-02T15:46:17.386Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, LR13, NR15, NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-674",
              "description": "CWE-674 Uncontrolled Recursion",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-02T02:29:47.843Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/June-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20678",
    "datePublished": "2025-06-02T02:29:47.843Z",
    "dateReserved": "2024-11-01T01:21:50.371Z",
    "dateUpdated": "2025-06-02T15:46:17.386Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20667 (GCVE-0-2025-20667)

Vulnerability from cvelistv5 – Published: 2025-05-05 02:49 – Updated: 2025-05-12 17:50
VLAI?

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20667",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-12T17:50:38.812599Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-12T17:50:53.123Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8675, MT8676, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8797",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, LR13, NR15, NR16, NR17, NR17R"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-326",
              "description": "CWE-326 Inadequate Encryption Strength",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-05T02:49:11.742Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/May-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20667",
    "datePublished": "2025-05-05T02:49:11.742Z",
    "dateReserved": "2024-11-01T01:21:50.368Z",
    "dateUpdated": "2025-05-12T17:50:53.123Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20150 (GCVE-0-2024-20150)

Vulnerability from cvelistv5 – Published: 2025-01-06 03:17 – Updated: 2025-01-06 14:13
VLAI?

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20150",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T14:13:49.851498Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-06T14:13:53.673Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2735, MT2737, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6880T, MT6880U, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8797, MT8798, MT8863",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A, LR13, NR15, NR16, NR17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01412526; Issue ID: MSV-2018."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502 Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T03:17:56.513Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20150",
    "datePublished": "2025-01-06T03:17:56.513Z",
    "dateReserved": "2023-11-02T13:35:35.188Z",
    "dateUpdated": "2025-01-06T14:13:53.673Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20076 (GCVE-0-2024-20076)

Vulnerability from cvelistv5 – Published: 2024-07-01 03:18 – Updated: 2024-08-01 21:52
VLAI?
Summary
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID: MSV-1481.
CWE
  • CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2731",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6739",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6761",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6762",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6763",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6767",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6769",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6771",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8666",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8667",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8765",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8766",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8768",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8781",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8786",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt8788",
            "vendor": "mediatek",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20076",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-01T14:13:20.468040Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-01T14:15:46.878Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.786Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2731, MT6739, MT6761, MT6762, MT6763, MT6765, MT6767, MT6768, MT6769, MT6771, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Modem LR12A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID: MSV-1481."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-01T03:18:02.941Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/July-2024"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20076",
    "datePublished": "2024-07-01T03:18:02.941Z",
    "dateReserved": "2023-11-02T13:35:35.172Z",
    "dateUpdated": "2024-08-01T21:52:31.786Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}