{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T04:29:37.347","vulnerabilities":[{"cve":{"id":"CVE-2025-20687","sourceIdentifier":"security@mediatek.com","published":"2025-07-08T03:15:28.143","lastModified":"2025-07-14T15:23:38.517","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In Bluetooth driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418045; Issue ID: MSV-3481."},{"lang":"es","value":"En el controlador Bluetooth, existe una posible lectura fuera de los límites debido a una comprobación incorrecta de los límites. Esto podría provocar una denegación de servicio local, con privilegios de ejecución de usuario requeridos. No se requiere la interacción del usuario para su explotación. ID de parche: WCNCR00418045; ID de problema: MSV-3481."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@mediatek.com","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mediatek:nbiot_sdk:*:*:*:*:*:*:*:*","versionEndIncluding":"3.6","matchCriteriaId":"4926CFD0-C88C-4A5A-8396-A719C52818B1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*","matchCriteriaId":"91DEA745-47A8-43F1-A1B2-F53F651A99EF"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*","matchCriteriaId":"140DAC08-96E9-47D3-BC2E-65E999DCFD50"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*","matchCriteriaId":"32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*","matchCriteriaId":"EA2A6813-7138-441E-A9E4-FF62FCBD797A"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:*","matchCriteriaId":"27CFC9DF-2F4C-469A-8A19-A260B1134CFE"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*","matchCriteriaId":"05525018-AFE0-415C-A71C-A77922C7D637"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/July-2025","source":"security@mediatek.com","tags":["Vendor Advisory"]}]}}]}