CVE-2022-32655

CVSS V2 None CVSS V3 None
Description
In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705028; Issue ID: GN20220705028.
Overview
  • CVE ID
  • CVE-2022-32655
  • Assigner
  • security@mediatek.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-02-06T20:15:11
  • Last Modified Date
  • 2023-02-14T02:27:51
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:mediatek:mt5221_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7603_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7613_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7615_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7622_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7628_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7629_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7663_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7668_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7682_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7682:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7686_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7686:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7687_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7687:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7697_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7697:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7902_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7915_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7916_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7921_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7933_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7933:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7981_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7986_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt8167s_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt8175_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt8362a_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt8365_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt8385_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt8518s_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt8532_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt8695_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt8696_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt8788_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:* 0 OR
References
Reference URL Reference Tags
https://corp.mediatek.com/product-security-bulletin/February-2023 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2023-04-17 07:15:23 Added to TrackCVE
2023-04-17 07:15:25 Weakness Enumeration new