Impact
The vulnerability is a use‑after‑free in the cameraisp component. It can be triggered when a Free operation leaves a dangling pointer that is subsequently dereferenced by code executing with system privileges. The result is a local denial of service that can crash the cameraisp process or otherwise disable camera functionality. Because the flaw is exploitable only after system privilege has already been achieved, it does not provide an additional elevation of privilege but can render the device non‑operational for the user.
Affected Systems
Affected systems include MediaTek chipsets such as MT6878, MT6879, MT6881, MT6886, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8168, MT8188, MT8195, MT8365, MT8370, MT8390, MT8395, MT8666, MT8667, MT8673, MT8676, MT8793, and Android platforms ranging from version 13.0 through 16.0 that incorporate these chipsets. These components are found in a range of Android devices supplied by MediaTek.
Risk and Exploitability
The CVSS score of 7.8 indicates a high risk, but the EPSS score of less than 1% signifies that exploitation is considered unlikely at this time. The vulnerability is not listed in the CISA KEV catalog. The attack vector is local with no user interaction required; an adversary must already possess system privileges to trigger the flaw. If the software is patched, the risk is mitigated, though operators should be aware that the flaw could be leveraged to crash the camera subsystem and disrupt device availability.
OpenCVE Enrichment