CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.3 | $0-$5k | 0.00 |
A vulnerability, which was classified as problematic, has been found in MediaTek MT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891 and MT6893. This issue affects some unknown functionality of the component Memory Management Driver. The manipulation with an unknown input leads to a resource consumption vulnerability. Using CWE to declare the problem leads to CWE-400. The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. Impacted is availability.
The weakness was published 09/27/2021. It is possible to read the advisory at corp.mediatek.com. The identification of this vulnerability is CVE-2021-0424 since 11/06/2020. The technical details are unknown and an exploit is not publicly available.
Applying a patch is able to eliminate this problem.
Product
Type
Vendor
Name
- MT6580
- MT6582E
- MT6582H
- MT6582T
- MT6582W
- MT6582_90
- MT6589
- MT6589TD
- MT6592E
- MT6592H
- MT6592T
- MT6592W
- MT6592_90
- MT6595
- MT6731
- MT6732
- MT6735
- MT6737
- MT6739
- MT6750
- MT6750S
- MT6752
- MT6753
- MT6755
- MT6755S
- MT6757
- MT6757C
- MT6757CD
- MT6757CH
- MT6758
- MT6761
- MT6762
- MT6763
- MT6765
- MT6768
- MT6769
- MT6771
- MT6779
- MT6785
- MT6795
- MT6797
- MT6799
- MT6833
- MT6853
- MT6853T
- MT6873
- MT6875
- MT6877
- MT6883
- MT6885
- MT6889
- MT6891
- MT6893
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.5VulDB Meta Temp Score: 5.3
VulDB Base Score: 5.5
VulDB Temp Score: 5.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Resource consumptionCWE: CWE-400 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Timeline
11/06/2020 🔍09/27/2021 🔍
09/27/2021 🔍
10/02/2021 🔍
Sources
Advisory: corp.mediatek.comStatus: Confirmed
CVE: CVE-2021-0424 (🔍)
Entry
Created: 09/27/2021 17:38Updated: 10/02/2021 17:38
Changes: 09/27/2021 17:38 (37), 10/02/2021 17:38 (1)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.