Skip to main content

CVE-2022-32617: Elevation of Privilege in MediaTek, Inc. MT6789, MT6855, MT6895, MT6983, MT8798

Medium
VulnerabilityCVE-2022-32617cvecve-2022-32617
Published: Tue Nov 08 2022 (11/08/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: MediaTek, Inc.
Product: MT6789, MT6855, MT6895, MT6983, MT8798

Description

In typec, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262364; Issue ID: ALPS07262364.

AI-Powered Analysis

AILast updated: 06/25/2025, 21:44:54 UTC

Technical Analysis

CVE-2022-32617 is a vulnerability identified in several MediaTek SoCs (System on Chips), specifically MT6789, MT6855, MT6895, MT6983, and MT8798, which are commonly integrated into Android devices running versions 11.0, 12.0, and 13.0. The vulnerability arises from an out-of-bounds write in the USB Type-C (typec) driver due to incorrect buffer size calculation (classified under CWE-131: Incorrect Calculation of Buffer Size). This flaw allows an attacker with physical access to the device to perform a local privilege escalation without requiring any prior execution privileges or user interaction. The out-of-bounds write can corrupt memory, potentially leading to arbitrary code execution or system compromise at a higher privilege level. The CVSS v3.1 base score is 6.8, reflecting a medium severity with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H), but requiring physical access (AV:P) and no user interaction (UI:N). No known exploits are currently reported in the wild, and a patch identified as ALPS07262364 has been issued by MediaTek to address this issue. The vulnerability’s exploitation scope is local, and it targets the kernel-level driver managing USB Type-C functionality, which is critical for device connectivity and charging. Given the affected Android versions, this vulnerability impacts a broad range of consumer devices using these MediaTek chipsets, including smartphones and tablets.

Potential Impact

For European organizations, the primary impact of CVE-2022-32617 lies in the potential compromise of mobile devices used within corporate environments, especially those issued to employees or used to access sensitive corporate resources. Successful exploitation could allow an attacker with physical access to escalate privileges on the device, bypass security controls, and potentially extract confidential data or install persistent malware. This risk is heightened in sectors with strict data protection requirements such as finance, healthcare, and government. The vulnerability could also undermine device integrity and availability, disrupting business operations reliant on mobile communications. Although remote exploitation is not feasible, the physical access requirement means that loss or theft of devices could lead to exploitation. Additionally, the vulnerability affects devices running widely deployed Android versions, increasing the attack surface. Organizations relying on MediaTek-powered devices should be aware of this risk, particularly in environments where device control and physical security are challenging to enforce.

Mitigation Recommendations

1. Immediate deployment of the official patch (ALPS07262364) from MediaTek or device manufacturers is critical to remediate the vulnerability. 2. Enforce strict physical security policies for mobile devices, including secure storage and use of tamper-evident seals to reduce the risk of unauthorized physical access. 3. Implement Mobile Device Management (MDM) solutions that can enforce encryption, remote wipe, and device lockdown to mitigate damage if a device is lost or stolen. 4. Educate employees on the risks of leaving devices unattended and the importance of reporting lost or stolen devices promptly. 5. Regularly audit and inventory devices to identify those with affected MediaTek chipsets and Android versions, prioritizing patching and replacement where patching is not feasible. 6. Consider additional endpoint security controls that monitor for unusual privilege escalation attempts or kernel-level anomalies on mobile devices. 7. Collaborate with device vendors to confirm patch availability and deployment timelines, ensuring timely updates in corporate environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2022-06-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbec6e1

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 6/25/2025, 9:44:54 PM

Last updated: 8/16/2025, 12:15:26 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats