Versions
Android 11.0, 12.0, 13.0 / Iot-Yocto 22.2 (Yocto 4.0)
Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3
Android 13.0
Android 13.0, 14.0 / openWRT 19.07, 21.02, 23.05 / Yocto 2.6, 3.3, 4.0 / RDK-B 22Q3
Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6, 3.3, 4.0 / RDK-B 22Q3
Modem LR13 NR15, NR16, and NR17
Android 11.0, 12.0, 13.0
Android 12.0, 13.0 / OpenWrt 21.02 / RDKB 2022Q3
Android 12.0, 13.0 / OpenWrt 19.07, 21.02 / RDK-B 2022Q3
Android 13.0, 14.0 / Yocto 2.6, 3.3, 4.0 / RDK-B 22Q3
Android 12.0
Modem LR12A, LR13, NR15, NR16.R1.MP, NR16.R1.MP1MP2.MP, NR16.R2.MP
Modem NR15, NR16, and NR17
Android 11.0, 12.0 and Yocto 3.1
Android 10.0, 11.0, 12.0 or Yocto 3.1, 3.3, 4.0
Modem LR12A, NR15, NR16, VMOLYN, NR17
Android 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3
Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2
Android 11.0, 12.0, 13.0, 14.0 / OpenWrt 19.07, 21.02 / Yocto 3.3, 4.0 / RDK-B 22Q3
Modem LR12A, LR13, NR15, NR16, NR17
Android 11.0, 12.0
Android 10.0, 11.0
Android 11.0
Android 11.0, 12.0, 13.0 / Linux 4.19 / Yocto 3.1, 3.3 / IOT-v23.0
Modem LR12A, LR13, NR15, NR16, NR17.R1, NR17.R2
Android 12.0, 13.0 / OpenWrt 19.07, 21.02 / RDK-B 22Q3 / Yocto 2.6, 3.3
Android 11.0, 12.0, 13.0, 14.0
Android 13.0, 14.0
Android 12.0, 13.0, 14.0 / Linux 4.19 / Yocto 3.3, 4.0 / OpenWrt 19.07, 21.02 / RDK-B 22Q3
Android 10.0, 11.0, 12.0
Android 12.0, 13.0, 14.0
Android 12.0, 13.0
Android 9.0, 10.0, 11.0, 12.0
Android 11.0, 12.0 and Yocto 3.1, 3.3
Android 12.0, 13.0 / OpenWrt 21.02 / Yocto 4.0 / IOT-v23.0
Android 12.0 / IOT-v23.0
Android 12.0 / Yocto 4.0 / Iot-Yocto 22.2
Android 10.0, 11.0, 12.0, 13.0
Recent CVEs
CVE-2024-20150
In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01412526; Issue ID: MSV-2018.
CVE-2024-20149
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01231341 / MOLY01263331 / MOLY01233835; Issue ID: MSV-2165.
CVE-2024-20154
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00720348; Issue ID: MSV-2392.
CVE-2024-20081
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08719602; Issue ID: MSV-1412.
CVE-2024-20080
In gnss service, there is a possible escalation of privilege due to improper certificate validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08720039; Issue ID: MSV-1424.
CVE-2024-20079
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID: MSV-1491.
CVE-2024-20064
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08572601; Issue ID: MSV-1229.
CVE-2023-32871
In DA, there is a possible permission bypass due to an incorrect status check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08355514; Issue ID: ALPS08355514.