{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T12:45:27.862","vulnerabilities":[{"cve":{"id":"CVE-2025-20677","sourceIdentifier":"security@mediatek.com","published":"2025-06-02T03:15:25.103","lastModified":"2025-07-10T17:40:08.303","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In Bluetooth driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00412256; Issue ID: MSV-3284."},{"lang":"es","value":"En el controlador Bluetooth, existe un posible fallo del sistema debido a una excepción no detectada. Esto podría provocar una denegación de servicio local, con privilegios de ejecución de usuario requeridos. No se requiere la interacción del usuario para su explotación. ID de parche: WCNCR00412256; ID de problema: MSV-3284."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@mediatek.com","type":"Secondary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mediatek:nbiot_sdk:*:*:*:*:*:*:*:*","versionEndIncluding":"3.6","matchCriteriaId":"4926CFD0-C88C-4A5A-8396-A719C52818B1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*","matchCriteriaId":"91DEA745-47A8-43F1-A1B2-F53F651A99EF"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*","matchCriteriaId":"32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*","matchCriteriaId":"EA2A6813-7138-441E-A9E4-FF62FCBD797A"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:*","matchCriteriaId":"27CFC9DF-2F4C-469A-8A19-A260B1134CFE"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*","matchCriteriaId":"05525018-AFE0-415C-A71C-A77922C7D637"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/June-2025","source":"security@mediatek.com","tags":["Vendor Advisory"]}]}}]}