{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T10:18:51.447","vulnerabilities":[{"cve":{"id":"CVE-2023-32831","sourceIdentifier":"security@mediatek.com","published":"2024-01-02T03:15:07.720","lastModified":"2025-06-18T15:15:21.070","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In wlan driver, there is a possible PIN crack due to use of insufficiently random values. This could lead to local information disclosure with no execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00325055; Issue ID: MSV-868."},{"lang":"es","value":"En el controlador WLAN, existe una posible vulneración del PIN debido al uso de valores insuficientemente aleatorios. Esto podría dar lugar a la divulgación de información local sin necesidad de privilegios de ejecución. La interacción del usuario no es necesaria para la explotación. ID de parche: WCNCR00325055; ID del problema: MSV-868."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-330"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-330"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mediatek:software_development_kit:*:*:*:*:*:*:*:*","versionEndIncluding":"7.6.7.1","matchCriteriaId":"70C1BCD5-180E-410C-A434-F6313616E7E6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*","matchCriteriaId":"171D1C08-F055-44C0-913C-AA2B73AF5B72"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*","matchCriteriaId":"EF2E9975-607D-4F06-A85A-B1C2BE3C5B75"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*","matchCriteriaId":"4979BA07-DC09-4DF8-BA7F-E4143A0ECFE6"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*","matchCriteriaId":"05748BB1-0D48-4097-932E-E8E2E574FD8D"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*","matchCriteriaId":"55EB4B27-6264-45BE-9A22-BE8418BB0C06"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7626:-:*:*:*:*:*:*:*","matchCriteriaId":"79C6A4C1-BAB5-4C53-91CF-2637C2ECF37F"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*","matchCriteriaId":"29C210A3-C71E-4010-9DD6-9E36CADC9EED"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*","matchCriteriaId":"3AB22996-9C22-4B6C-9E94-E4C055D16335"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*","matchCriteriaId":"DD5AA441-5381-4179-89EB-1642120F72B4"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*","matchCriteriaId":"490CD97B-021F-4350-AEE7-A2FA866D5889"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*","matchCriteriaId":"40A9E917-4B34-403F-B512-09EEBEA46811"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/January-2024","source":"security@mediatek.com","tags":["Vendor Advisory"]},{"url":"https://corp.mediatek.com/product-security-bulletin/January-2024","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}