{"containers":{"cna":{"affected":[{"product":"MT6580, MT6731, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8696, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797","vendor":"MediaTek, Inc.","versions":[{"status":"affected","version":"Android 11.0, 12.0"}]}],"descriptions":[{"lang":"en","value":"In aee driver, there is a possible reference count mistake due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06209201."}],"problemTypes":[{"descriptions":[{"description":"Elevation of Privilege","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-05-03T19:57:39.000Z","orgId":"ee979b05-11f8-4f25-a7e0-a1fa9c190374","shortName":"MediaTek"},"references":[{"tags":["x_refsource_MISC"],"url":"https://corp.mediatek.com/product-security-bulletin/May-2022"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@mediatek.com","ID":"CVE-2022-20088","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"MT6580, MT6731, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8696, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797","version":{"version_data":[{"version_value":"Android 11.0, 12.0"}]}}]},"vendor_name":"MediaTek, Inc."}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In aee driver, there is a possible reference count mistake due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06209201."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Elevation of Privilege"}]}]},"references":{"reference_data":[{"name":"https://corp.mediatek.com/product-security-bulletin/May-2022","refsource":"MISC","url":"https://corp.mediatek.com/product-security-bulletin/May-2022"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T02:02:30.784Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://corp.mediatek.com/product-security-bulletin/May-2022"}]}]},"cveMetadata":{"assignerOrgId":"ee979b05-11f8-4f25-a7e0-a1fa9c190374","assignerShortName":"MediaTek","cveId":"CVE-2022-20088","datePublished":"2022-05-03T19:57:39.000Z","dateReserved":"2021-10-12T00:00:00.000Z","dateUpdated":"2024-08-03T02:02:30.784Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}