Vulnerability
CVE-2023-32846
Component: CELLULAR
Location: FIRMWARE
In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01138453 (MSV-861).
Impact
Severity (Manufact.)
MEDIUM
Severity (NIST)
7.5
Severity (Android)
N/A
Chipsets
70
Devices
472
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
MT6833 | Dimensity 6020 Dimensity 700 | MediaTek |
MT6833V/ZA | Dimensity 6020 Dimensity 700 | MediaTek |
MT6833V/NZA | Dimensity 700 | MediaTek |
MT6853V/ZA | Dimensity 720 | MediaTek |
MT6853V/NZA | Dimensity 720 | MediaTek |
MT6853V/TNZA | Dimensity 800U | MediaTek |
MT6853T | Dimensity 800U | MediaTek |
MT6873 | Dimensity 800 | MediaTek |
MT6833 | Dimensity 6080 Dimensity 810 | MediaTek |
MT6833V/PNZA | Dimensity 810 | MediaTek |
70 of 70 row(s) shown.
Rows per page
Page 1 of 7
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2020
Reported:
Unknown
Advisory Published:
Dec 4, 2023
CVE Published:
Dec 4, 2023
Android Patch Level:
None