Show plain JSON{"id": "CVE-2023-20717", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 4.1, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 0.5}]}, "published": "2023-05-15T22:15:11.190", "references": [{"url": "https://corp.mediatek.com/product-security-bulletin/May-2023", "tags": ["Vendor Advisory"], "source": "security@mediatek.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "In vcu, there is a possible leak of dma buffer due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645185; Issue ID: ALPS07645185."}], "lastModified": "2023-05-22T17:49:25.877", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"}, {"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"}, {"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"}, {"criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3"}, {"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"}, {"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"}, {"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"}, {"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"}, {"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"}, {"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"}, {"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"}, {"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"}, {"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"}, {"criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"}, {"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"}, {"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"}, {"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"}, {"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"}, {"criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"}, {"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"}, {"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"}, {"criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F"}, {"criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E"}, {"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"}, {"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"}, {"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"}, {"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "security@mediatek.com"}