CVE-2021-40148

CVSS V2 Medium 5 CVSS V3 High 7.5
Description
In Modem EMM, there is a possible information disclosure due to a missing data encryption. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00716585; Issue ID: ALPS05886933.
Overview
  • CVE ID
  • CVE-2021-40148
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-01-04T16:15:09
  • Last Modified Date
  • 2022-01-14T16:14:49
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:mediatek:l9:*:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt3967:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • NONE
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://corp.mediatek.com/product-security-bulletin/January-2022 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:37:26 Added to TrackCVE
2022-12-06 05:39:49 2022-01-04T16:15Z 2022-01-04T16:15:09 CVE Published Date updated
2022-12-06 05:39:50 2022-01-14T16:14:49 CVE Modified Date updated
2022-12-06 05:39:50 Analyzed Vulnerability Status updated