Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
mt8390 Vendor: mediatek

About This Product

mt8390 is a software product offered by mediatek. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 54 known vulnerabilities affecting mediatek mt8390. This includes 9 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2023 to 2026, indicating a recent active security attention. 44 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2023-20688 2023-04-06 2025-02-12 4.4 - -
CVE-2023-32822 2023-10-02 2024-11-21 6.7 - -
CVE-2023-32826 2023-10-02 2024-11-21 6.7 - -
CVE-2023-32827 2023-10-02 2024-11-21 6.7 - -
CVE-2023-32828 2023-10-02 2024-11-21 6.7 - -
CVE-2023-32829 2023-10-02 2024-11-21 6.7 - -
CVE-2023-32825 2023-11-06 2024-11-21 5.5 - -
CVE-2023-32838 2023-11-06 2024-11-21 6.7 - -
CVE-2023-32847 2023-12-04 2024-11-21 7.8 - -
CVE-2023-32859 2023-12-04 2024-11-21 6.7 - -
CVE-2023-32883 2024-01-02 2025-06-03 6.7 - -
CVE-2024-20020 2024-03-04 2025-03-28 4.4 - -
CVE-2024-20023 2024-03-04 2025-04-22 6.7 - -
CVE-2024-20033 2024-03-04 2025-04-22 4.4 - -
CVE-2024-20040 2024-04-01 2025-04-23 8.8 - -
CVE-2024-20048 2024-04-01 2025-04-23 6.2 - -
CVE-2024-20049 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20050 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20051 2024-04-01 2025-04-23 2.3 - -
CVE-2024-20052 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20053 2024-04-01 2025-04-23 8.4 - -
CVE-2024-20054 2024-04-01 2025-04-23 6.6 - -
CVE-2024-20055 2024-04-01 2025-04-23 6.3 - -
CVE-2023-32871 2024-05-06 2025-05-05 5.3 - -
CVE-2024-20059 2024-05-06 2025-04-30 6.7 - -
CVE-2024-20060 2024-05-06 2025-04-30 5.9 - -
CVE-2024-20084 2024-09-02 2024-10-27 4.4 - -
CVE-2024-20085 2024-09-02 2024-10-27 4.4 - -
CVE-2024-20104 2024-11-04 2025-04-24 8.4 - -
CVE-2024-20107 2024-11-04 2025-04-24 6.2 - -
CVE-2024-20108 2024-11-04 2025-04-22 6.7 - -
CVE-2024-20125 2024-12-02 2025-04-22 6.7 - -
CVE-2024-20136 2024-12-02 2025-04-22 6.2 - -
CVE-2024-20138 2024-12-02 2025-04-22 7.5 - -
CVE-2024-20143 2025-01-06 2025-04-22 6.6 - -
CVE-2024-20144 2025-01-06 2025-04-22 6.6 - -
CVE-2024-20147 2025-02-03 2025-04-22 5.3 - -
CVE-2025-20635 2025-02-03 2025-03-13 6.6 - -
CVE-2025-20648 2025-03-03 2025-04-22 5.5 - -
CVE-2025-20650 2025-03-03 2025-04-22 6.8 - -
CVE-2025-20651 2025-03-03 2025-04-22 4.1 - -
CVE-2025-20653 2025-03-03 2025-04-22 6.5 - -
CVE-2025-20656 2025-04-07 2025-04-09 6.8 - -
CVE-2025-20665 2025-05-05 2025-05-12 5.5 - -
CVE-2025-20694 2025-07-08 2025-07-14 6.5 - -
CVE-2025-20696 2025-08-04 2025-08-18 6.8 - -
CVE-2025-20721 2025-10-14 2025-10-15 7.8 - -
CVE-2025-20743 2025-11-04 2025-11-05 4.2 - -
CVE-2025-20745 2025-11-04 2025-11-05 4.2 - -
CVE-2025-20795 2026-01-06 2026-01-08 7.8 - -
CVE-2026-20410 2026-02-02 2026-02-04 6.7 - -
CVE-2026-20411 2026-02-02 2026-02-04 7.8 - -
CVE-2026-20412 2026-02-02 2026-02-04 7.8 - -
CVE-2026-20435 2026-03-02 2026-03-03 4.6 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for mediatek mt8390 by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.