Impact
The flaw resides in MediaTek's geniezone component, where a missing permission check allows a user already in possession of System privilege to elevate themselves to a higher privilege level. It is a classic privilege‑escalation vulnerability catalogued as CWE‑280. No additional user interaction or remote access is required; once System privilege is achieved, the attacker can expand control over the device firmware.
Affected Systems
MediaTek, Inc. chipset firmware, particularly the geniezone subsystem, is affected. The presence of patch ID ALPS10708513 in the MediaTek product‑security bulletin indicates the issue exists in current or recent firmware releases. Specific version ranges are not listed, so users should consult the bulletin for details.
Risk and Exploitability
The EPSS estimate is less than 1% and the vulnerability is not listed in CISA's KEV catalog, suggesting no widespread exploitation so far. The CVSS score of 6.7 indicates a moderate severity. Nevertheless, because no user interaction is needed and the flaw can be triggered by anyone who already holds System privilege, the risk remains significant in environments where such privileges can be attained. The attacker must first obtain or compromise System level access; thereafter the privilege escalation can proceed unimpeded, potentially giving full control over the device.
OpenCVE Enrichment