{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-20693","assignerOrgId":"ee979b05-11f8-4f25-a7e0-a1fa9c190374","state":"PUBLISHED","assignerShortName":"MediaTek","dateReserved":"2022-10-28T02:03:10.755Z","datePublished":"2023-07-04T01:44:56.418Z","dateUpdated":"2024-12-04T16:26:25.234Z"},"containers":{"cna":{"providerMetadata":{"orgId":"ee979b05-11f8-4f25-a7e0-a1fa9c190374","shortName":"MediaTek","dateUpdated":"2023-07-04T01:44:56.418Z"},"descriptions":[{"lang":"en","value":"In wlan firmware, there is possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07664711; Issue ID: ALPS07664711."}],"affected":[{"vendor":"MediaTek, Inc.","product":"MT6739, MT6895, MT6983, MT8167, MT8168, MT8195, MT8321, MT8365, MT8385, MT8666, MT8765, MT8781, MT8788","versions":[{"version":"Android 11.0, 12.0 / IOT-v23.0 (Yocto 4.0)","status":"affected"}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/July-2023"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Denial of Service"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T09:14:40.244Z"},"title":"CVE Program Container","references":[{"url":"https://corp.mediatek.com/product-security-bulletin/July-2023","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-04T16:26:15.420254Z","id":"CVE-2023-20693","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-04T16:26:25.234Z"}}]}}