ID

VAR-202311-0169


CVE

CVE-2023-20702


DESCRIPTION

In 5G NRLC, there is a possible invalid memory access due to lack of error handling. This could lead to remote denial of service, if UE received invalid 1-byte rlc sdu, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00921261; Issue ID: MOLY01128895

Trust: 0.99

sources: NVD: CVE-2023-20702 // VULMON: CVE-2023-20702

AFFECTED PRODUCTS

vendor:mediatekmodel:nr15scope:eqversion: -

Trust: 1.0

vendor:mediatekmodel:nr17scope:eqversion: -

Trust: 1.0

vendor:mediatekmodel:nr16scope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2023-20702

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-20702
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-20702
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2023-20702
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: NVD: CVE-2023-20702 // NVD: CVE-2023-20702

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2023-20702

EXTERNAL IDS

db:NVDid:CVE-2023-20702

Trust: 1.1

db:VULMONid:CVE-2023-20702

Trust: 0.1

sources: VULMON: CVE-2023-20702 // NVD: CVE-2023-20702

REFERENCES

url:https://corp.mediatek.com/product-security-bulletin/november-2023

Trust: 1.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-20702 // NVD: CVE-2023-20702

SOURCES

db:VULMONid:CVE-2023-20702
db:NVDid:CVE-2023-20702

LAST UPDATE DATE

2024-09-05T23:10:50.714000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-20702date:2023-11-06T00:00:00
db:NVDid:CVE-2023-20702date:2024-09-05T16:35:02.980

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-20702date:2023-11-06T00:00:00
db:NVDid:CVE-2023-20702date:2023-11-06T04:15:07.653