Mediatek

Mt6769

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 39.24%
  • Veröffentlicht 06.01.2025 04:15:07
  • Zuletzt bearbeitet 17.02.2026 15:16:05

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User ...

  • EPSS 2.92%
  • Veröffentlicht 01.07.2024 05:15:04
  • Zuletzt bearbeitet 28.05.2025 20:12:30

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297807; Issue ID:...

  • EPSS 2.92%
  • Veröffentlicht 01.07.2024 05:15:03
  • Zuletzt bearbeitet 28.05.2025 20:12:55

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID:...

  • EPSS 0.07%
  • Veröffentlicht 01.04.2024 03:15:08
  • Zuletzt bearbeitet 23.04.2025 13:47:04

In gnss, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08580200; Iss...

  • EPSS 2.88%
  • Veröffentlicht 01.04.2024 03:15:07
  • Zuletzt bearbeitet 23.04.2025 13:48:41

In modem protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01240012...

  • EPSS 0%
  • Veröffentlicht 04.03.2024 03:15:06
  • Zuletzt bearbeitet 22.04.2025 20:36:03

In da, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355599; Issue I...