Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-32633: Elevation of Privilege in MediaTek, Inc. MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT7902, MT7921, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797

0
Medium
Published: Mon Dec 05 2022 (12/05/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: MediaTek, Inc.
Product: MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT7902, MT7921, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797

Description

In Wi-Fi, there is a possible memory access violation due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441637; Issue ID: ALPS07441637.

AI-Powered Analysis

AILast updated: 06/24/2025, 04:26:31 UTC

Technical Analysis

CVE-2022-32633 is a medium-severity elevation of privilege vulnerability affecting a wide range of MediaTek system-on-chip (SoC) models, including MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT7902, MT7921, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, and MT8797. These SoCs are commonly integrated into Android devices running versions 11.0, 12.0, and 13.0, as well as Yocto Linux distributions 3.1 and 3.3. The vulnerability arises from a logic error in the Wi-Fi component, leading to a possible memory access violation. Exploitation requires local system execution privileges but does not require user interaction, meaning an attacker with some level of access can escalate privileges to system level. The vulnerability is classified under CWE-269 (Improper Privilege Management). The CVSS v3.1 base score is 6.7, indicating a medium severity, with attack vector local (AV:L), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no direct patch links are provided, though MediaTek has assigned a patch ID (ALPS07441637). This vulnerability could allow an attacker who already has some local access to the device to gain full system privileges, potentially compromising the entire device and its data through the Wi-Fi subsystem.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to enterprises and sectors relying heavily on mobile devices or embedded systems powered by MediaTek SoCs, such as telecommunications, manufacturing, and IoT deployments. The ability to escalate privileges locally without user interaction means that if an attacker gains limited access—via malware, insider threat, or physical access—they could fully compromise the device. This could lead to unauthorized access to sensitive corporate data, disruption of device functionality, and lateral movement within corporate networks. Given the widespread use of MediaTek chips in consumer and industrial devices, the vulnerability could also affect supply chains and endpoint security. The impact on confidentiality, integrity, and availability is high, potentially enabling data exfiltration, device manipulation, or denial of service. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. Organizations with BYOD policies or those deploying Android-based IoT devices should be particularly vigilant.

Mitigation Recommendations

1. Prioritize patching: Organizations should monitor MediaTek and device OEM advisories for patches corresponding to ALPS07441637 and apply them promptly to affected devices. 2. Device inventory and risk assessment: Identify all devices using affected MediaTek SoCs and assess their exposure and criticality within the network. 3. Limit local access: Enforce strict access controls to prevent unauthorized local access to devices, including physical security and endpoint protection measures. 4. Network segmentation: Isolate vulnerable devices on separate network segments to limit potential lateral movement if compromised. 5. Monitor for suspicious activity: Deploy endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts and anomalous Wi-Fi subsystem behavior. 6. Harden Wi-Fi configurations: Disable unnecessary Wi-Fi features or interfaces on devices where possible to reduce attack surface. 7. User awareness and policy: Educate users on risks of installing untrusted applications or connecting to untrusted networks that could facilitate local compromise. 8. For embedded or IoT deployments, consider additional runtime protections such as application whitelisting and integrity checks to detect unauthorized privilege escalations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2022-06-09T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1172

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 4:26:31 AM

Last updated: 2/7/2026, 9:03:51 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats