Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-45078

Summary
Assigner-lenovo
Assigner Org ID-da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At-08 Nov, 2023 | 22:30
Updated At-04 Sep, 2024 | 17:50
Rejected At-
Credits

A memory leakage vulnerability was reported in the DustFilterAlertSmm SMM driver that may allow a local attacker with elevated privileges to write to NVRAM variables.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:lenovo
Assigner Org ID:da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At:08 Nov, 2023 | 22:30
Updated At:04 Sep, 2024 | 17:50
Rejected At:
▼CVE Numbering Authority (CNA)

A memory leakage vulnerability was reported in the DustFilterAlertSmm SMM driver that may allow a local attacker with elevated privileges to write to NVRAM variables.

Affected Products
Vendor
Lenovo Group LimitedLenovo
Product
BIOS
Default Status
unaffected
Versions
Affected
  • various
Problem Types
TypeCWE IDDescription
CWECWE-125CWE-125 Out-of-bounds Read
Type: CWE
CWE ID: CWE-125
Description: CWE-125 Out-of-bounds Read
Metrics
VersionBase scoreBase severityVector
3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Update system firmware to the version (or newer) indicated for your model in the advisory: https://support.lenovo.com/us/en/product_security/LEN-141775

Configurations

Workarounds

Exploits

Credits

finder
Lenovo thanks Souhardya Sardar of Cyberstanc for reporting this issue.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.lenovo.com/us/en/product_security/LEN-141775
N/A
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-141775
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.lenovo.com/us/en/product_security/LEN-141775
x_transferred
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-141775
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
Lenovo Group Limitedlenovo
Product
bios
CPEs
  • cpe:2.3:o:lenovo:bios:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • various
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@lenovo.com
Published At:08 Nov, 2023 | 23:15
Updated At:16 Nov, 2023 | 18:04

A memory leakage vulnerability was reported in the DustFilterAlertSmm SMM driver that may allow a local attacker with elevated privileges to write to NVRAM variables.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Lenovo Group Limited
lenovo
>>ideacentre_c5-14imb05_firmware>>Versions before o4hkt3ca(exclusive)
cpe:2.3:o:lenovo:ideacentre_c5-14imb05_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_c5-14imb05>>-
cpe:2.3:h:lenovo:ideacentre_c5-14imb05:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_3-07ada05_firmware>>Versions before o4fkt39a(exclusive)
cpe:2.3:o:lenovo:ideacentre_3-07ada05_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_3-07ada05>>-
cpe:2.3:h:lenovo:ideacentre_3-07ada05:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_3-07imb05_firmware>>Versions before m2vkt21a(exclusive)
cpe:2.3:o:lenovo:ideacentre_3-07imb05_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_3-07imb05>>-
cpe:2.3:h:lenovo:ideacentre_3-07imb05:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_g5-14imb05_firmware>>Versions before o4hkt3ca(exclusive)
cpe:2.3:o:lenovo:ideacentre_g5-14imb05_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_g5-14imb05>>-
cpe:2.3:h:lenovo:ideacentre_g5-14imb05:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_5-14iob6_firmware>>Versions before m3gkt3da(exclusive)
cpe:2.3:o:lenovo:ideacentre_5-14iob6_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_5-14iob6>>-
cpe:2.3:h:lenovo:ideacentre_5-14iob6:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_creator_5-14iob6_firmware>>Versions before m3gkt3da(exclusive)
cpe:2.3:o:lenovo:ideacentre_creator_5-14iob6_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_creator_5-14iob6>>-
cpe:2.3:h:lenovo:ideacentre_creator_5-14iob6:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_g5-14amr05_firmware>>Versions before o4zkt2ba(exclusive)
cpe:2.3:o:lenovo:ideacentre_g5-14amr05_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_g5-14amr05>>-
cpe:2.3:h:lenovo:ideacentre_g5-14amr05:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_g5-14imb05_firmware>>Versions before o4hkt3ca(exclusive)
cpe:2.3:o:lenovo:ideacentre_g5-14imb05_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_g5-14imb05>>-
cpe:2.3:h:lenovo:ideacentre_g5-14imb05:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_gaming_5-14iob6_firmware>>Versions before m3gkt3da(exclusive)
cpe:2.3:o:lenovo:ideacentre_gaming_5-14iob6_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_gaming_5-14iob6>>-
cpe:2.3:h:lenovo:ideacentre_gaming_5-14iob6:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_mini_5_01iaq7_firmware>>Versions before o53kt10a(exclusive)
cpe:2.3:o:lenovo:ideacentre_mini_5_01iaq7_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_mini_5_01iaq7>>-
cpe:2.3:h:lenovo:ideacentre_mini_5_01iaq7:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_mini_5-01imh05_firmware>>Versions before o4ekt1ba(exclusive)
cpe:2.3:o:lenovo:ideacentre_mini_5-01imh05_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ideacentre_mini_5-01imh05>>-
cpe:2.3:h:lenovo:ideacentre_mini_5-01imh05:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>legion_t7-34imz5_firmware>>Versions before o5fkt17a(exclusive)
cpe:2.3:o:lenovo:legion_t7-34imz5_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>legion_t7-34imz5>>-
cpe:2.3:h:lenovo:legion_t7-34imz5:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m625q_firmware>>Versions before m1wkt52a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m625q_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m625q>>-
cpe:2.3:h:lenovo:thinkcentre_m625q:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m630e_firmware>>-
cpe:2.3:o:lenovo:thinkcentre_m630e_firmware:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m630e>>-
cpe:2.3:h:lenovo:thinkcentre_m630e:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m70a_firmware>>Versions before m2skt29a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m70a_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m70a>>-
cpe:2.3:h:lenovo:thinkcentre_m70a:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m920z_all-in-one_firmware>>Versions before m1mkt56a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m920z_all-in-one_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m920z_all-in-one>>-
cpe:2.3:h:lenovo:thinkcentre_m920z_all-in-one:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m920x_firmware>>Versions before m1ukt72a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m920x_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m920x>>-
cpe:2.3:h:lenovo:thinkcentre_m920x:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m920t_firmware>>Versions before m1ukt72a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m920t_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m920t>>-
cpe:2.3:h:lenovo:thinkcentre_m920t:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m920s_firmware>>Versions before m1ukt72a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m920s_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m920s>>-
cpe:2.3:h:lenovo:thinkcentre_m920s:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m920q_firmware>>Versions before m1ukt72a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m920q_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m920q>>-
cpe:2.3:h:lenovo:thinkcentre_m920q:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m90t_firmware>>Versions before m2tkt55a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m90t_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m90t>>-
cpe:2.3:h:lenovo:thinkcentre_m90t:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m90s_firmware>>Versions before m2tkt55a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m90s_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m90s>>-
cpe:2.3:h:lenovo:thinkcentre_m90s:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m90q_tiny_firmware>>Versions before m2wkt5aa(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m90q_tiny_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m90q_tiny>>-
cpe:2.3:h:lenovo:thinkcentre_m90q_tiny:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m90a_firmware>>Versions before m2rkt57a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m90a_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m90a>>-
cpe:2.3:h:lenovo:thinkcentre_m90a:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m820z_all-in-one_firmware>>Versions before m1nkt62a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m820z_all-in-one_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m820z_all-in-one>>-
cpe:2.3:h:lenovo:thinkcentre_m820z_all-in-one:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-125Primarypsirt@lenovo.com
CWE ID: CWE-125
Type: Primary
Source: psirt@lenovo.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.lenovo.com/us/en/product_security/LEN-141775psirt@lenovo.com
Vendor Advisory
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-141775
Source: psirt@lenovo.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

119Records found

CVE-2023-20723
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.68%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 12:12
Updated-02 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07843845; Issue ID: ALPS07843845.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt8183androidmt8175mt8167MT8167, MT8175, MT8183
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-20774
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.70%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 01:44
Updated-04 Dec, 2024 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292228; Issue ID: ALPS07292228.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6855mt6895mt6985mt6789mt6835androidmt6886mt8673mt6983mt8781mt8195MT6789, MT6835, MT6855, MT6886, MT6895, MT6983, MT6985, MT8195, MT8673, MT8781
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-21063
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.68%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-20 Feb, 2025 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ParseWithAuthType of simdata.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243129862References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-21064
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.68%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-20 Feb, 2025 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In DoSetPinControl of miscservice.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243130078References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-21207
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.08%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-04 Dec, 2024 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In initiateTdlsSetupInternal of sta_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262236670

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-20724
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.68%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 12:12
Updated-02 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07843845; Issue ID: ALPS07843841.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt8183androidmt8175mt8167MT8167, MT8175, MT8183
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-15090
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.09% / 27.21%
||
7 Day CHG~0.00%
Published-15 Aug, 2019 | 23:47
Updated-05 Aug, 2024 | 00:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in drivers/scsi/qedi/qedi_dbg.c in the Linux kernel before 5.1.12. In the qedi_dbg_* family of functions, there is an out-of-bounds read.

Action-Not Available
Vendor-n/aopenSUSELinux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kernelleapn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-0371
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.85%
||
7 Day CHG~0.00%
Published-10 Mar, 2021 | 15:55
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In nci_proc_rf_management_ntf of nci_hrcv.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-164440989

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-34402
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.12% / 31.53%
||
7 Day CHG~0.00%
Published-18 Jan, 2022 | 18:05
Updated-04 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Tegra kernel driver contains a vulnerability in NVIDIA NVDEC, where a user with high privileges might be able to read from or write to a memory location that is outside the intended boundary of the buffer, which may lead to denial of service, Information disclosure, loss of Integrity, or possible escalation of privileges.

Action-Not Available
Vendor-Google LLCNVIDIA Corporation
Product-androidshield_experienceSHIELD TV
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42510
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 13.95%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-18 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In StringsRequestData::encode of requestdata.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241762656References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40524
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.49%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:23
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in Modem

Memory corruption due to buffer over-read in Modem while processing SetNativeHandle RTP service.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwarewsa8830sa6150p_firmwaresa8145p_firmwaresw5100psd865_5gqcc5100sdx55m_firmwarewsa8835wcd9380sa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwareqca6426qca6430_firmwarewcn3980wcn3998sdxr2_5g_firmwaresd855wcn3660bwcn6850wsa8815qca6426_firmwarewcn3660b_firmwareqca6574au_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn3980_firmwareqca6391sdx55mqca6420qca6436_firmwareqcc5100_firmwareaqt1000_firmwaresa6155p_firmwaresdxr2_5gwcn6851_firmwarewcn3988_firmwareqca6430qca6574ausa6145p_firmwaresa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresw5100sd870wsa8810qca6436wcn6851sa6155psw5100p_firmwaresa6145pwcn3680bwcd9341qca6696_firmwaresa8145psd870_firmwareqca6696qca6391_firmwareqca6390aqt1000sa8150psa6150psa8155pwsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-20660
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.54%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 03:14
Updated-18 Apr, 2025 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PlayReady TA, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: DTV04436357; Issue ID: MSV-3186.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt9972androidMT9972
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-20661
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.54%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 03:14
Updated-14 Apr, 2025 | 16:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PlayReady TA, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: DTV04436357; Issue ID: MSV-3185.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-androidmt9972MT9972
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-20905
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-6.3||MEDIUM
EPSS-0.02% / 4.18%
||
7 Day CHG~0.00%
Published-04 Feb, 2025 | 07:24
Updated-12 Feb, 2025 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read and write in mPOS TUI trustlet prior to SMR Feb-2025 Release 1 allows local privileged attackers to read and write out-of-bounds memory.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-androidSamsung Mobile Devices
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-20662
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.54%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 03:14
Updated-14 Apr, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PlayReady TA, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: DTV04428276; Issue ID: MSV-3184.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-androidmt9972MT9972
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-9390
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.59%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 22:23
Updated-19 Dec, 2024 | 16:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In procfile_write of gl_proc.c, there is a possible out of bounds read of a function pointer due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-20022
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 4.95%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 02:43
Updated-13 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255.

Action-Not Available
Vendor-rdkcentralMediaTek Inc.Google LLCOpenWrtThe Linux Foundation
Product-mt6886yoctomt6835mt8673mt8667mt6789androidmt8789mt2737mt8781mt8321mt8798mt8765mt6983mt6855mt8796mt6895mt6880mt8788mt8768mt8385mt6989mt8791mt8797mt8786openwrtmt6990rdkbmt6890mt8766mt8666mt6985mt6980mt6879MT2737, MT6789, MT6835, MT6855, MT6879, MT6880, MT6886, MT6890, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8321, MT8385, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8796, MT8797, MT8798mt6895mt6886mt6879mt6880mt8788mt8768mt6835mt8385mt6989mt8791mt8673mt8797mt8667mt6789mt8786mt6990mt8789mt6890mt2737mt8781mt8766mt8666mt8321mt6985mt8798mt8765mt6980mt6983mt6855mt8796
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-45568
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 2.16%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-09 May, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Camera Driver

Memory corruption due to improper bounds check while command handling in camera-kernel driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewcd9385wsa8835sxr2230p_firmwarewcn3660bwcd9385_firmwaresxr2230pwcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwaresxr2250p_firmwarewcd9380snapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwarewsa8832_firmwarewsa8832wcn3660b_firmwarefastconnect_7800sxr2250pSnapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2020-8757
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 34.05%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:07
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-cloud_backupactive_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-125
Out-of-bounds Read
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found