{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T18:57:01.587","vulnerabilities":[{"cve":{"id":"CVE-2026-20445","sourceIdentifier":"security@mediatek.com","published":"2026-03-02T09:16:18.007","lastModified":"2026-03-03T12:57:06.617","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In MDDP, there is a possible system crash due to a race condition. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10289875; Issue ID: MSV-5184."},{"lang":"es","value":"En MDDP, existe una posible caída del sistema debido a una condición de carrera. Esto podría llevar a una denegación de servicio local si un actor malicioso ya ha obtenido el privilegio de Sistema. No se necesita interacción del usuario para la explotación. ID del parche: ALPS10289875; ID del problema: MSV-5184."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H","baseScore":4.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":0.7,"impactScore":3.6}]},"weaknesses":[{"source":"security@mediatek.com","type":"Secondary","description":[{"lang":"en","value":"CWE-367"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*","matchCriteriaId":"2700BCC5-634D-4EC6-AB67-5B678D5F951D"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*","matchCriteriaId":"8538774C-906D-4B03-A3E7-FA7A55E0DA9E"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:*","matchCriteriaId":"02882AB1-7993-47DD-84A0-8DF4272D85ED"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*","matchCriteriaId":"19A63103-C708-48EC-B44D-5E465A6B79C5"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*","matchCriteriaId":"89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*","matchCriteriaId":"855A8046-34ED-4891-ACE5-76AB10AC8D53"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*","matchCriteriaId":"704BE5CE-AE08-4432-A8B0-4C8BD62148AD"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*","matchCriteriaId":"15E2EC3F-9FB3-488B-B1C1-2793A416C755"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*","matchCriteriaId":"DD64413C-C774-4C4F-9551-89E1AA9469EE"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*","matchCriteriaId":"AF3E2B84-DAFE-4E11-B23B-026F719475F5"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*","matchCriteriaId":"3B787DC3-8E5A-4968-B20B-37B6257FAAE2"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*","matchCriteriaId":"213B5C7F-D965-4312-9CDF-4F06FA77D401"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*","matchCriteriaId":"E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*","matchCriteriaId":"2A7D8055-F4B6-41EE-A078-11D56285AB66"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*","matchCriteriaId":"C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*","matchCriteriaId":"EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*","matchCriteriaId":"EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*","matchCriteriaId":"AD7DE6B2-66D9-4A3E-B15F-D56505559255"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*","matchCriteriaId":"CBBB30DF-E963-4940-B742-F6801F68C3FC"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6993:-:*:*:*:*:*:*:*","matchCriteriaId":"57E92BE0-5E65-4770-8E1A-0E5D07A38164"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*","matchCriteriaId":"BA3D4A45-38EE-4125-AE67-89D1C707F95A"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*","matchCriteriaId":"152A5F3D-8004-4649-BDB1-E6F0798AF1CB"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*","matchCriteriaId":"1CF88096-5CBD-4A4B-8F47-33D38985956F"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*","matchCriteriaId":"0D09F23D-D023-4A60-B426-61251FDD8A5A"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*","matchCriteriaId":"2B469BF4-5961-42E9-814B-1BE06D182E45"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*","matchCriteriaId":"637CAAD2-DCC0-4F81-B781-5D0536844CA8"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/March-2026","source":"security@mediatek.com","tags":["Vendor Advisory"]}]}}]}