{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T16:45:38.441","vulnerabilities":[{"cve":{"id":"CVE-2026-20407","sourceIdentifier":"security@mediatek.com","published":"2026-02-02T09:15:55.520","lastModified":"2026-02-04T13:50:50.817","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00464377; Issue ID: MSV-4905."},{"lang":"es","value":"En el controlador STA de WLAN, existe una posible escalada de privilegios debido a una falta de verificación de límites. Esto podría llevar a una escalada de privilegios local con privilegios de ejecución de usuario necesarios. No se necesita interacción del usuario para la explotación. ID del parche: WCNCR00464377; ID del problema: MSV-4905."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":6.0}]},"weaknesses":[{"source":"security@mediatek.com","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mediatek:nbiot_sdk:*:*:*:*:*:*:*:*","versionEndIncluding":"3.8","matchCriteriaId":"513F2D0C-0D1C-4C90-AA0F-4F43BF08EB0C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*","matchCriteriaId":"91DEA745-47A8-43F1-A1B2-F53F651A99EF"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*","matchCriteriaId":"140DAC08-96E9-47D3-BC2E-65E999DCFD50"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*","matchCriteriaId":"32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*","matchCriteriaId":"EA2A6813-7138-441E-A9E4-FF62FCBD797A"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:*","matchCriteriaId":"27CFC9DF-2F4C-469A-8A19-A260B1134CFE"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*","matchCriteriaId":"05525018-AFE0-415C-A71C-A77922C7D637"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/February-2026","source":"security@mediatek.com","tags":["Vendor Advisory"]}]}}]}