CVE-2022-32658

CVSS V2 None CVSS V3 None
Description
In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705059; Issue ID: GN20220705059.
Overview
  • CVE ID
  • CVE-2022-32658
  • Assigner
  • security@mediatek.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-03T21:15:12
  • Last Modified Date
  • 2023-01-10T03:33:38
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:mediatek:mt7603_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7613_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7615_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7622_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7628_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7629_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7915_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7916_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7981_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:mediatek:mt7986_firmware:7.6.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:* 0 OR
History
Created Old Value New Value Data Type Notes
2023-01-03 22:16:49 Added to TrackCVE
2023-01-04 14:14:30 2023-01-04T14:02:51 CVE Modified Date updated
2023-01-04 14:14:30 Received Awaiting Analysis Vulnerability Status updated
2023-01-08 05:20:47 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-10 03:41:42 2023-01-10T03:33:38 CVE Modified Date updated
2023-01-10 03:41:42 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-10 03:41:43 Weakness Enumeration new
2023-01-10 03:41:44 CPE Information updated