October 2022 Product Security Bulletin

Published 2022-10-03
The MediaTek Product Security Bulletin contains details of security vulnerabilities affecting MediaTek Smartphone, Tablet, AIoT, Smart display, Smart platform, OTT and Wi-Fi chipsets. Device OEMs have been notified of all the issues and the corresponding security patches for at least two months before publication.

The severity of the identified vulnerabilities was conducted based on the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).


Summary

Severity CVEs
High CVE-2022-26471, CVE-2022-26472
Medium CVE-2022-26452, CVE-2022-26473, CVE-2022-26474, CVE-2022-26475, CVE-2022-32589, CVE-2022-32590, CVE-2022-32591, CVE-2022-32592, CVE-2022-32593


Details

CVE CVE-2022-26471
Title Deserialization of untrusted data in telephony
Severity High
Vulnerability Type EoP
CWE CWE-502 Deserialization of Untrusted Data
Description In telephony, there is a possible escalation of privilege due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6580, MT6739, MT6761, MT6765, MT6768, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8321, MT8385, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797
Affected Software Versions Android 12.0

CVE CVE-2022-26472
Title Deserialization of untrusted data in ims
Severity High
Vulnerability Type EoP
CWE CWE-502 Deserialization of Untrusted Data
Description In ims, there is a possible escalation of privilege due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8321, MT8385, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797
Affected Software Versions Android 10.0, 11.0, 12.0

CVE CVE-2022-26452
Title Improper synchronization in isp
Severity Medium
Vulnerability Type EoP
CWE CWE-662 Improper Synchronization
Description In isp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6879, MT6895, MT6983
Affected Software Versions Android 12.0

CVE CVE-2022-26473
Title Improper synchronization in vdec fmt
Severity Medium
Vulnerability Type EoP
CWE CWE-662 Improper Synchronization
Description In vdec fmt, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6789, MT6855, MT6879, MT6895, MT6983, MT8168, MT8365, MT8695, MT8696, MT8798
Affected Software Versions Android 12.0

CVE CVE-2022-26474
Title Incorrect calculation of buffer size in sensorhub
Severity Medium
Vulnerability Type EoP
CWE CWE-131 Incorrect Calculation of Buffer Size
Description In sensorhub, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6789, MT6855, MT6879, MT6895, MT6983
Affected Software Versions Android 12.0

CVE CVE-2022-26475
Title Improper input validation in wlan
Severity Medium
Vulnerability Type EoP
CWE CWE-20 Improper Input Validation
Description In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6853, MT6855, MT6873, MT6875, MT6879, MT6883, MT6885, MT6889, MT6895, MT6983, MT7663, MT7902, MT7921, MT8167S, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8512A, MT8518, MT8532, MT8667, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789
Affected Software Versions Android 11.0, 12.0 and Yocto 3.1, 3.3

CVE CVE-2022-32589
Title Improper resource shutdown or release in Wi-Fi driver
Severity Medium
Vulnerability Type DoS
CWE CWE-404 Improper Resource Shutdown or Release
Description In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6761, MT6762, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8512A, MT8518, MT8532, MT8667, MT8766, MT8768, MT8786, MT8788, MT8789
Affected Software Versions Android 11.0, 12.0 and Yocto 3.1, 3.3

CVE CVE-2022-32590
Title Improper check or handling of exceptional conditions in wlan
Severity Medium
Vulnerability Type EoP
CWE CWE-703 Improper Check or Handling of Exceptional Conditions
Description In wlan, there is a possible use after free due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8512A, MT8518, MT8532, MT8667, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789
Affected Software Versions Android 11.0, 12.0 and Yocto 3.1, 3.3

CVE CVE-2022-32591
Title Improper input validation in ril
Severity Medium
Vulnerability Type DoS
CWE CWE-20 Improper Input Validation
Description In ril, there is a possible system crash due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6580, MT6739, MT6753, MT6757, MT6761, MT6762, MT6763, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6885, MT6893, MT6895, MT6983, MT8321, MT8385, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797
Affected Software Versions Android 11.0, 12.0

CVE CVE-2022-32592
Title Improper input validation in cpu dvfs
Severity Medium
Vulnerability Type EoP
CWE CWE-20 Improper Input Validation
Description In cpu dvfs, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6855, MT6879, MT6895, MT6983, MT8185, MT8321, MT8385, MT8518, MT8666, MT8675, MT8765, MT8768, MT8786, MT8788, MT8789
Affected Software Versions Android 11.0, 12.0 and Yocto 3.1, 3.3

CVE CVE-2022-32593
Title Improper input validation in vowe
Severity Medium
Vulnerability Type EoP
CWE CWE-20 Improper Input Validation
Description In vowe, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6983
Affected Software Versions Android 12.0


Vulnerability Type Definition

Abbreviation Definition
RCE Remote Code Execution
EoP Elevation of Privilege
ID Information Disclosure
DoS Denial of Service
N/A Classification not available


Versions

Version Date Description
1.0 October 3, 2022 Bulletin published.


Notes

Information above is generated only at the time of creation of this Security Bulletin. The list of affected chipsets could be not complete. For any further information, device OEMs can reach your MediaTek contact person if needed.

If you want to report a security vulnerability in MediaTek chipsets or products, please go to Report Security Vulnerability page on MediaTek website.