Show plain JSON{"id": "CVE-2023-20702", "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2023-11-06T04:15:07.653", "references": [{"url": "https://corp.mediatek.com/product-security-bulletin/November-2023", "tags": ["Vendor Advisory"], "source": "security@mediatek.com"}, {"url": "https://corp.mediatek.com/product-security-bulletin/November-2023", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "In 5G NRLC, there is a possible invalid memory access due to lack of error handling. This could lead to remote denial of service, if UE received invalid 1-byte rlc sdu, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00921261; Issue ID: MOLY01128895."}, {"lang": "es", "value": "En 5G NRLC, existe un posible acceso no v\u00e1lido a la memoria debido a la falta de manejo de errores. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio, si el UE recibiera un rlc sdu de 1 byte no v\u00e1lido, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY00921261; ID del problema: MOLY01128895."}], "lastModified": "2024-11-21T07:41:22.977", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2"}, {"criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315"}, {"criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"}, {"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"}, {"criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"}, {"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"}, {"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"}, {"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"}, {"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"}, {"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"}, {"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"}, {"criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F"}, {"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"}, {"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"}, {"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"}, {"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"}, {"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"}, {"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"}, {"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"}, {"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"}, {"criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "security@mediatek.com"}