13 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 20EXPL: 0

07 Oct 2024 — In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00843282; Issue ID: MSV-1535. • https://corp.mediatek.com/product-security-bulletin/October-2024 • CWE-617: Reachable Assertion •

CVSS: 9.8EPSS: 1%CPEs: 30EXPL: 0

14 Aug 2024 — In Modem, there is a possible memory corruption due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01182594; Issue ID: MSV-1529. • https://corp.mediatek.com/product-security-bulletin/August-2024 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.5EPSS: 0%CPEs: 16EXPL: 0

03 Jun 2024 — In modem, there is a possible selection of less-secure algorithm during the VoWiFi IKE due to a missing DH downgrade check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01286330; Issue ID: MSV-1430. En el módem, existe una posible selección de algoritmos menos seguros durante el IKE de VoWiFi debido a que falta una verificación de degradación de DH. • https://corp.mediatek.com/product-security-bulletin/June-2024 • CWE-757: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') •

CVSS: 7.8EPSS: 1%CPEs: 21EXPL: 0

05 Feb 2024 — In Modem NL1, there is a possible system crash due to an improper input validation. This could lead to remote denial of service, if NW sent invalid NR RRC Connection Setup message, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01191612; Issue ID: MOLY01195812 (MSV-985). En Modem NL1, existe una posible falla del sistema debido a una validación de entrada incorrecta. • https://corp.mediatek.com/product-security-bulletin/February-2024 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 1%CPEs: 21EXPL: 0

05 Feb 2024 — In Modem NL1, there is a possible system crash due to an improper input validation. This could lead to remote denial of service, if NW sent invalid NR RRC Connection Setup message, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01191612; Issue ID: MOLY01191612 (MSV-981). En Modem NL1, existe una posible falla del sistema debido a una validación de entrada incorrecta. • https://corp.mediatek.com/product-security-bulletin/February-2024 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 2%CPEs: 36EXPL: 0

04 Dec 2023 — In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01138453 (MSV-861). En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-617: Reachable Assertion •

CVSS: 7.8EPSS: 2%CPEs: 36EXPL: 0

04 Dec 2023 — In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01139296 (MSV-860). En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-617: Reachable Assertion •

CVSS: 7.8EPSS: 1%CPEs: 36EXPL: 0

04 Dec 2023 — In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01130183 (MSV-850). En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-617: Reachable Assertion •

CVSS: 7.8EPSS: 2%CPEs: 36EXPL: 0

04 Dec 2023 — In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130204; Issue ID: MOLY01130204 (MSV-849). En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-617: Reachable Assertion •

CVSS: 7.8EPSS: 2%CPEs: 36EXPL: 0

04 Dec 2023 — In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130256; Issue ID: MOLY01130256 (MSV-848). En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-617: Reachable Assertion •