Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
mt2713 Vendor: mediatek

About This Product

mt2713 is a software product offered by mediatek. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 49 known vulnerabilities affecting mediatek mt2713. This includes 3 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2023 to 2024, indicating a recent active security attention. 45 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2023-20786 2023-08-07 2024-11-21 6.7 - -
CVE-2023-20790 2023-08-07 2024-11-21 4.4 - -
CVE-2023-20798 2023-08-07 2024-11-21 4.4 - -
CVE-2023-20803 2023-08-07 2024-11-21 6.5 - -
CVE-2023-20804 2023-08-07 2024-11-21 6.7 - -
CVE-2023-20805 2023-08-07 2024-11-21 6.7 - -
CVE-2023-20806 2023-08-07 2024-11-21 6.7 - -
CVE-2023-20807 2023-08-07 2024-11-21 6.7 - -
CVE-2023-20821 2023-09-04 2024-11-21 6.7 - -
CVE-2023-20824 2023-09-04 2024-11-21 5.5 - -
CVE-2023-20825 2023-09-04 2024-11-21 5.5 - -
CVE-2023-20830 2023-09-04 2024-11-21 6.7 - -
CVE-2023-20838 2023-09-04 2024-11-21 4.0 - -
CVE-2023-20839 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20841 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20842 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20848 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20849 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20850 2023-09-04 2024-11-21 6.5 - -
CVE-2023-32808 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32809 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32810 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32811 2023-09-04 2024-11-21 6.7 - -
CVE-2023-32812 2023-09-04 2024-11-21 6.7 - -
CVE-2023-32813 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32814 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32815 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32816 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32817 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32822 2023-10-02 2024-11-21 6.7 - -
CVE-2023-32825 2023-11-06 2024-11-21 5.5 - -
CVE-2023-32838 2023-11-06 2024-11-21 6.7 - -
CVE-2023-32839 2023-11-06 2024-11-21 6.7 - -
CVE-2023-32847 2023-12-04 2024-11-21 7.8 - -
CVE-2023-32883 2024-01-02 2025-06-03 6.7 - -
CVE-2023-32884 2024-01-02 2025-06-03 6.7 - -
CVE-2024-20006 2024-02-05 2024-11-21 6.7 - -
CVE-2024-20020 2024-03-04 2025-03-28 4.4 - -
CVE-2024-20023 2024-03-04 2025-04-22 6.7 - -
CVE-2024-20033 2024-03-04 2025-04-22 4.4 - -
CVE-2024-20040 2024-04-01 2025-04-23 8.8 - -
CVE-2024-20041 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20048 2024-04-01 2025-04-23 6.2 - -
CVE-2024-20049 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20050 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20051 2024-04-01 2025-04-23 2.3 - -
CVE-2024-20052 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20053 2024-04-01 2025-04-23 8.4 - -
CVE-2024-20055 2024-04-01 2025-04-23 6.3 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for mediatek mt2713 by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.