Vulnerability Details CVE-2022-21743
In ion, there is a possible use after free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06371108; Issue ID: ALPS06371108.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 10.0%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 4.6
Products affected by CVE-2022-21743
-
cpe:2.3:h:mediatek:mt6580:-
-
cpe:2.3:h:mediatek:mt6735:-
-
cpe:2.3:h:mediatek:mt6737:-
-
cpe:2.3:h:mediatek:mt6739:-
-
cpe:2.3:h:mediatek:mt6750:-
-
cpe:2.3:h:mediatek:mt6750s:-
-
cpe:2.3:h:mediatek:mt6753:-
-
cpe:2.3:h:mediatek:mt6757:-
-
cpe:2.3:h:mediatek:mt6757c:-
-
cpe:2.3:h:mediatek:mt6757cd:-
-
cpe:2.3:h:mediatek:mt6757ch:-
-
cpe:2.3:h:mediatek:mt6761:-
-
cpe:2.3:h:mediatek:mt6762:-
-
cpe:2.3:h:mediatek:mt6763:-
-
cpe:2.3:h:mediatek:mt6765:-
-
cpe:2.3:h:mediatek:mt6768:-
-
cpe:2.3:h:mediatek:mt6769:-
-
cpe:2.3:h:mediatek:mt6771:-
-
cpe:2.3:h:mediatek:mt6779:-
-
cpe:2.3:h:mediatek:mt6781:-
-
cpe:2.3:h:mediatek:mt6785:-
-
cpe:2.3:h:mediatek:mt6797:-
-
cpe:2.3:h:mediatek:mt6833:-
-
cpe:2.3:h:mediatek:mt6853:-
-
cpe:2.3:h:mediatek:mt6853t:-
-
cpe:2.3:h:mediatek:mt6873:-
-
cpe:2.3:h:mediatek:mt6875:-
-
cpe:2.3:h:mediatek:mt6877:-
-
cpe:2.3:h:mediatek:mt6883:-
-
cpe:2.3:h:mediatek:mt6885:-
-
cpe:2.3:h:mediatek:mt6889:-
-
cpe:2.3:h:mediatek:mt6893:-
-
cpe:2.3:h:mediatek:mt8167:-
-
cpe:2.3:h:mediatek:mt8168:-
-
cpe:2.3:h:mediatek:mt8173:-
-
cpe:2.3:h:mediatek:mt8185:-
-
cpe:2.3:h:mediatek:mt8321:-
-
cpe:2.3:h:mediatek:mt8362a:-
-
cpe:2.3:h:mediatek:mt8365:-
-
cpe:2.3:h:mediatek:mt8385:-
-
cpe:2.3:h:mediatek:mt8666:-
-
cpe:2.3:h:mediatek:mt8675:-
-
cpe:2.3:h:mediatek:mt8695:-
-
cpe:2.3:h:mediatek:mt8696:-
-
cpe:2.3:h:mediatek:mt8765:-
-
cpe:2.3:h:mediatek:mt8766:-
-
cpe:2.3:h:mediatek:mt8768:-
-
cpe:2.3:h:mediatek:mt8786:-
-
cpe:2.3:h:mediatek:mt8788:-
-
cpe:2.3:h:mediatek:mt8789:-
-
cpe:2.3:h:mediatek:mt8791:-
-
cpe:2.3:h:mediatek:mt8797:-
-
cpe:2.3:o:google:android:10.0
-
cpe:2.3:o:google:android:11.0
-
cpe:2.3:o:google:android:12.0
-
cpe:2.3:o:google:android:9.0