Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-32617: Elevation of Privilege in MediaTek, Inc. MT6789, MT6855, MT6895, MT6983, MT8798

0
Medium
VulnerabilityCVE-2022-32617cvecve-2022-32617
Published: Tue Nov 08 2022 (11/08/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: MediaTek, Inc.
Product: MT6789, MT6855, MT6895, MT6983, MT8798

Description

In typec, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262364; Issue ID: ALPS07262364.

AI-Powered Analysis

AILast updated: 06/25/2025, 21:44:54 UTC

Technical Analysis

CVE-2022-32617 is a vulnerability identified in several MediaTek SoCs (System on Chips), specifically MT6789, MT6855, MT6895, MT6983, and MT8798, which are commonly integrated into Android devices running versions 11.0, 12.0, and 13.0. The vulnerability arises from an out-of-bounds write in the USB Type-C (typec) driver due to incorrect buffer size calculation (classified under CWE-131: Incorrect Calculation of Buffer Size). This flaw allows an attacker with physical access to the device to perform a local privilege escalation without requiring any prior execution privileges or user interaction. The out-of-bounds write can corrupt memory, potentially leading to arbitrary code execution or system compromise at a higher privilege level. The CVSS v3.1 base score is 6.8, reflecting a medium severity with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H), but requiring physical access (AV:P) and no user interaction (UI:N). No known exploits are currently reported in the wild, and a patch identified as ALPS07262364 has been issued by MediaTek to address this issue. The vulnerability’s exploitation scope is local, and it targets the kernel-level driver managing USB Type-C functionality, which is critical for device connectivity and charging. Given the affected Android versions, this vulnerability impacts a broad range of consumer devices using these MediaTek chipsets, including smartphones and tablets.

Potential Impact

For European organizations, the primary impact of CVE-2022-32617 lies in the potential compromise of mobile devices used within corporate environments, especially those issued to employees or used to access sensitive corporate resources. Successful exploitation could allow an attacker with physical access to escalate privileges on the device, bypass security controls, and potentially extract confidential data or install persistent malware. This risk is heightened in sectors with strict data protection requirements such as finance, healthcare, and government. The vulnerability could also undermine device integrity and availability, disrupting business operations reliant on mobile communications. Although remote exploitation is not feasible, the physical access requirement means that loss or theft of devices could lead to exploitation. Additionally, the vulnerability affects devices running widely deployed Android versions, increasing the attack surface. Organizations relying on MediaTek-powered devices should be aware of this risk, particularly in environments where device control and physical security are challenging to enforce.

Mitigation Recommendations

1. Immediate deployment of the official patch (ALPS07262364) from MediaTek or device manufacturers is critical to remediate the vulnerability. 2. Enforce strict physical security policies for mobile devices, including secure storage and use of tamper-evident seals to reduce the risk of unauthorized physical access. 3. Implement Mobile Device Management (MDM) solutions that can enforce encryption, remote wipe, and device lockdown to mitigate damage if a device is lost or stolen. 4. Educate employees on the risks of leaving devices unattended and the importance of reporting lost or stolen devices promptly. 5. Regularly audit and inventory devices to identify those with affected MediaTek chipsets and Android versions, prioritizing patching and replacement where patching is not feasible. 6. Consider additional endpoint security controls that monitor for unusual privilege escalation attempts or kernel-level anomalies on mobile devices. 7. Collaborate with device vendors to confirm patch availability and deployment timelines, ensuring timely updates in corporate environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2022-06-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbec6e1

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 6/25/2025, 9:44:54 PM

Last updated: 2/7/2026, 2:20:11 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats