SB2022080320 - Multiple vulnerabilities in MediaTek chipsets 



SB2022080320 - Multiple vulnerabilities in MediaTek chipsets

Published: August 3, 2022 Updated: October 19, 2022

Security Bulletin ID SB2022080320
Severity
High
Patch available
YES
Number of vulnerabilities 25
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 4% Low 96%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 25 secuirty vulnerabilities.


1) Type Confusion (CVE-ID: CVE-2022-26433)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a type confusion error in mailbox. A local application can trigger a type confusion error and execute arbitrary code with elevated privileges.


2) Out-of-bounds write (CVE-ID: CVE-2022-26445)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the wifi driver. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


3) Out-of-bounds write (CVE-ID: CVE-2022-26444)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the wifi driver. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


4) Out-of-bounds write (CVE-ID: CVE-2022-26443)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the wifi driver. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


5) Out-of-bounds write (CVE-ID: CVE-2022-26442)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the wifi driver. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


6) Out-of-bounds write (CVE-ID: CVE-2022-26441)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the wifi driver. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


7) Out-of-bounds write (CVE-ID: CVE-2022-26440)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the wifi driver. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


8) Out-of-bounds write (CVE-ID: CVE-2022-26439)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the wifi driver. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


9) Out-of-bounds write (CVE-ID: CVE-2022-26438)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the wifi driver. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


10) Out-of-bounds read (CVE-ID: CVE-2022-26436)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in emi mpu. A local application can trigger an out-of-bounds read error and read contents of memory on the system.


11) Type Confusion (CVE-ID: CVE-2022-26435)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a type confusion error in mailbox. A local application can trigger a type confusion error and execute arbitrary code with elevated privileges.


12) Out-of-bounds write (CVE-ID: CVE-2022-26434)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within mailbox. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


13) Out-of-bounds write (CVE-ID: CVE-2022-26432)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within mailbox. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


14) Out-of-bounds write (CVE-ID: CVE-2022-26437)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input within httpclient from NBIOT SDK. A remote attacker can send specially crafted HTTP response, trigger an out-of-bounds write and execute arbitrary code on the target system.


15) Out-of-bounds write (CVE-ID: CVE-2022-26431)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within mailbox. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


16) Type Confusion (CVE-ID: CVE-2022-26430)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a type confusion error in mailbox. A local application can trigger a type confusion error and execute arbitrary code with elevated privileges.



17) Detection of Error Condition Without Action (CVE-ID: CVE-2022-21788)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to incorrect error handling in scp. A local application can escalate privileges on the system by using an undefined behavior.


18) Improper access control (CVE-ID: CVE-2022-26429)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to missing permission check in cta. A local application can write permission usage records of an app and escalate privileges on the system.


19) Race condition (CVE-ID: CVE-2022-26428)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a race condition within the video codec. A local application can exploit the race and escalate privileges on the system.


20) Out-of-bounds write (CVE-ID: CVE-2022-26427)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the camera isp. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


21) Out-of-bounds write (CVE-ID: CVE-2022-26426)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the camera isp. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


22) Out-of-bounds write (CVE-ID: CVE-2022-21792)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the camera isp. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


23) Out-of-bounds read (CVE-ID: CVE-2022-21791)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the camera isp. A local application can trigger an out-of-bounds read error and read contents of memory on the system.


24) Out-of-bounds read (CVE-ID: CVE-2022-21790)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in camera isp. A local application can trigger an out-of-bounds read error and read contents of memory on the system.


25) Race condition (CVE-ID: CVE-2022-21789)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a race condition within the audio ipi. A local application can exploit the race and escalate privileges on the system.


Remediation

Install update from vendor's website.