![]() References: M-ALPS02897901.Īn elevation of privilege vulnerability in the Qualcomm bootloader could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.Īn elevation of privilege vulnerability in the MediaTek touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. Patch information is provided when available. This information may include identifying information, values, definitions, and related links. Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9Įntries may include additional information provided by organizations and efforts sponsored by US-CERT. ![]() ![]() Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9 High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 The division of high, medium, and low severities correspond to the following scores: The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. For modified or updated entries, please visit the NVD, which contains historical vulnerability information. ![]() The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week.
0 Comments
Leave a Reply. |