Mediatek Mt8768 Luki w zabezpieczeniach

Oś czasu

Ostatni rok

Wersja

12.01
13.01
Android 11.01

Przeciwdziałanie

Official Fix290
Temporary Fix0
Workaround0
Unavailable0
Not Defined0

Wykorzystywanie

High0
Functional0
Proof-of-Concept0
Unproven0
Not Defined290

Wektor dostępu

Not Defined0
Physical9
Local251
Adjacent1
Network29

Uwierzytelnianie

Not Defined0
High193
Low77
None20

Interakcja z użytkownikiem

Not Defined0
Required16
None274

C3BM Index

Ostatni rok

CVSSv3 Base

≤10
≤20
≤318
≤452
≤575
≤692
≤748
≤83
≤91
≤101

CVSSv3 Temp

≤10
≤20
≤318
≤487
≤540
≤694
≤746
≤83
≤91
≤101

VulDB

≤10
≤20
≤363
≤425
≤5134
≤629
≤735
≤81
≤93
≤100

NVD

≤10
≤20
≤30
≤41
≤548
≤624
≤7105
≤818
≤90
≤103

CNA

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Sprzedawca

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Exploit 0-day

<1k182
<2k69
<5k37
<10k2
<25k0
<50k0
<100k0
≥100k0

Wykorzystaj dzisiaj

<1k289
<2k1
<5k0
<10k0
<25k0
<50k0
<100k0
≥100k0

Wykorzystaj wielkość rynku

Ostatni rok

🔴 CTI Zajęcia

Affected Versions (3): 12.0, 13.0, Android 11.0

Typ oprogramowania: Chip Software

OpublikowanoBaseTempSłaby punkt0dayDzisiajWykPrzCTICVE
2024-04-014.24.0MediaTek MT8893 Gnss memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2024-20054
2024-04-014.24.0MediaTek MT8798 Flashc memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.05CVE-2024-20053
2024-04-014.44.2MediaTek MT8798 Flashc denial of service$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2024-20051
2024-04-014.24.0MediaTek MT8798 Battery memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2024-20046
2024-04-014.24.0MediaTek MT8798 Da memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.02CVE-2024-20044
2024-04-014.24.0MediaTek MT8798 Da memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2024-20043
2024-04-014.24.0MediaTek MT8798 Da memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2024-20042
2024-04-012.32.2MediaTek MT8798 Flashc information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2024-20052
2024-04-012.32.2MediaTek MT8798 Flashc information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2024-20050
2024-04-012.32.2MediaTek MT8798 Flashc information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.02CVE-2024-20049
2024-04-012.32.2MediaTek MT8798 Flashc information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.06CVE-2024-20048
2024-04-012.32.2MediaTek MT8797 Battery information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.02CVE-2024-20047
2024-04-012.32.2MediaTek MT8798 Audio information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.06CVE-2024-20045
2024-04-016.36.0MediaTek MT8798 Modem Protocol memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2024-20039
2024-03-044.24.0MediaTek MT8796 Aee privilege escalation$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2024-20032
2024-03-046.76.4MediaTek MT8798 Battery memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.09CVE-2024-20034
2024-03-046.76.4MediaTek MT8798 Da memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2024-20025
2024-03-046.76.4MediaTek MT8798 Lk memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.02CVE-2024-20022
2024-03-042.32.2MediaTek MT8798 Nvram information disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2024-20033
2024-02-054.44.3MediaTek MT8798 Ged denial of service$0-$5k$0-$5kNot DefinedOfficial Fix0.05CVE-2024-20016
2024-02-056.56.4MediaTek MT8798 Telephony privilege escalation$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2024-20015
2024-02-055.45.3MediaTek MT8798 Keyinstall memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2024-20013
2024-02-055.45.3MediaTek MT8798 Keyinstall privilege escalation$0-$5k$0-$5kNot DefinedOfficial Fix0.07CVE-2024-20012
2024-02-055.45.3MediaTek MT8798 Keyinstall privilege escalation$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2024-20010
2024-02-056.05.9MediaTek MT8798 mp3 Decoder memory corruption$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2024-20007

265 więcej wpisów nie jest pokazywanych

więcej wpisów autorstwa Mediatek

Want to stay up to date on a daily basis?

Enable the mail alert feature now!