5G NR RLC DoS via Invalid SDU Handling
CVE-2023-20702 Published on November 6, 2023

In 5G NRLC, there is a possible invalid memory access due to lack of error handling. This could lead to remote denial of service, if UE received invalid 1-byte rlc sdu, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00921261; Issue ID: MOLY01128895.

NVD

Vulnerability Analysis

CVE-2023-20702 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
HIGH

Products Associated with CVE-2023-20702

Want to know whenever a new CVE is published for MediaTek products? stack.watch will email you.

 
 
 

Affected Versions

MediaTek, Inc. MT6835, MT6873, MT6875, MT6879, MT6883, MT6885, MT6886, MT6889, MT6895, MT6980, MT6983, MT6985, MT6990, MT8673, MT8675, MT8791, MT8791T, MT8797, MT8798: mediatek mt6835: mediatek mt6873: mediatek mt6875: mediatek mt6879: mediatek mt6883: mediatek mt6885: mediatek mt6886: mediatek mt6889: mediatek mt6895: mediatek mt6980: mediatek mt6983: mediatek mt6985: mediatek mt6990: mediatek mt8673: mediatek mt8675: mediatek mt8791: mediatek mt8791t: mediatek mt8797: mediatek mt8798:

Exploit Probability

EPSS
0.76%
Percentile
73.07%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.