Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
mt8395 Vendor: mediatek

About This Product

mt8395 is a software product offered by mediatek. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 91 known vulnerabilities affecting mediatek mt8395. This includes 8 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2023 to 2026, indicating a recent active security attention. 81 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2023-20655 2023-04-06 2025-03-17 7.8 - -
CVE-2023-20688 2023-04-06 2025-02-12 4.4 - -
CVE-2023-20673 2023-05-15 2025-01-24 6.7 - -
CVE-2023-20694 2023-05-15 2025-01-23 6.7 - -
CVE-2023-20695 2023-05-15 2025-01-23 6.7 - -
CVE-2023-20696 2023-05-15 2025-01-23 6.7 - -
CVE-2023-20718 2023-05-15 2025-01-24 6.7 - -
CVE-2023-20721 2023-05-15 2025-01-24 6.7 - -
CVE-2023-20728 2023-06-06 2025-01-07 4.4 - -
CVE-2023-20733 2023-06-06 2025-01-08 6.7 - -
CVE-2023-20734 2023-06-06 2025-01-08 6.7 - -
CVE-2023-20735 2023-06-06 2025-01-08 6.7 - -
CVE-2023-20736 2023-06-06 2025-01-07 6.4 - -
CVE-2023-20737 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20738 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20740 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20743 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20744 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20745 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20746 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20790 2023-08-07 2024-11-21 4.4 - -
CVE-2023-20798 2023-08-07 2024-11-21 4.4 - -
CVE-2023-20800 2023-08-07 2024-11-21 6.5 - -
CVE-2023-20801 2023-08-07 2024-11-21 6.4 - -
CVE-2023-20802 2023-08-07 2024-11-21 6.5 - -
CVE-2023-20803 2023-08-07 2024-11-21 6.5 - -
CVE-2023-20804 2023-08-07 2024-11-21 6.7 - -
CVE-2023-20805 2023-08-07 2024-11-21 6.7 - -
CVE-2023-20806 2023-08-07 2024-11-21 6.7 - -
CVE-2023-20807 2023-08-07 2024-11-21 6.7 - -
CVE-2023-20821 2023-09-04 2024-11-21 6.7 - -
CVE-2023-20835 2023-09-04 2024-11-21 6.4 - -
CVE-2023-20839 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20840 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20841 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20842 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20843 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20844 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20845 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20846 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20847 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20848 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20849 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20850 2023-09-04 2024-11-21 6.5 - -
CVE-2023-32826 2023-10-02 2024-11-21 6.7 - -
CVE-2023-32827 2023-10-02 2024-11-21 6.7 - -
CVE-2023-32828 2023-10-02 2024-11-21 6.7 - -
CVE-2023-32829 2023-10-02 2024-11-21 6.7 - -
CVE-2023-32838 2023-11-06 2024-11-21 6.7 - -
CVE-2023-32847 2023-12-04 2024-11-21 7.8 - -
CVE-2023-32859 2023-12-04 2024-11-21 6.7 - -
CVE-2023-32883 2024-01-02 2025-06-03 6.7 - -
CVE-2023-32884 2024-01-02 2025-06-03 6.7 - -
CVE-2024-20020 2024-03-04 2025-03-28 4.4 - -
CVE-2024-20025 2024-03-04 2025-04-22 6.7 - -
CVE-2024-20033 2024-03-04 2025-04-22 4.4 - -
CVE-2024-20040 2024-04-01 2025-04-23 8.8 - -
CVE-2024-20042 2024-04-01 2025-04-23 6.6 - -
CVE-2024-20043 2024-04-01 2025-04-23 6.6 - -
CVE-2024-20044 2024-04-01 2025-04-23 6.6 - -
CVE-2024-20048 2024-04-01 2025-04-23 6.2 - -
CVE-2024-20049 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20050 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20051 2024-04-01 2025-04-23 2.3 - -
CVE-2024-20052 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20053 2024-04-01 2025-04-23 8.4 - -
CVE-2024-20055 2024-04-01 2025-04-23 6.3 - -
CVE-2023-32871 2024-05-06 2025-05-05 5.3 - -
CVE-2024-20084 2024-09-02 2024-10-27 4.4 - -
CVE-2024-20085 2024-09-02 2024-10-27 4.4 - -
CVE-2024-20108 2024-11-04 2025-04-22 6.7 - -
CVE-2024-20125 2024-12-02 2025-04-22 6.7 - -
CVE-2024-20141 2025-02-03 2025-02-03 6.6 - -
CVE-2024-20142 2025-02-03 2025-02-03 6.6 - -
CVE-2024-20147 2025-02-03 2025-04-22 5.3 - -
CVE-2025-20638 2025-02-03 2025-02-03 4.3 - -
CVE-2025-20639 2025-02-03 2025-02-04 6.6 - -
CVE-2025-20640 2025-02-03 2025-02-04 4.3 - -
CVE-2025-20641 2025-02-03 2025-02-04 6.6 - -
CVE-2025-20642 2025-02-03 2025-02-04 6.6 - -
CVE-2025-20643 2025-02-03 2025-02-04 3.9 - -
CVE-2025-20648 2025-03-03 2025-04-22 5.5 - -
CVE-2025-20652 2025-03-03 2025-04-22 4.6 - -
CVE-2025-20665 2025-05-05 2025-05-12 5.5 - -
CVE-2025-20694 2025-07-08 2025-07-14 6.5 - -
CVE-2025-20721 2025-10-14 2025-10-15 7.8 - -
CVE-2025-20745 2025-11-04 2025-11-05 4.2 - -
CVE-2025-20795 2026-01-06 2026-01-08 7.8 - -
CVE-2026-20410 2026-02-02 2026-02-04 6.7 - -
CVE-2026-20411 2026-02-02 2026-02-04 7.8 - -
CVE-2026-20412 2026-02-02 2026-02-04 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for mediatek mt8395 by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.