rdkcentral CVE Vulnerabilities & Metrics

Focus on rdkcentral vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About rdkcentral Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with rdkcentral. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total rdkcentral CVEs: 22
Earliest CVE date: 20 Jun 2019, 14:15 UTC
Latest CVE date: 03 Feb 2025, 04:15 UTC

Latest CVE reference: CVE-2025-20635

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 5

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): -61.54%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): -61.54%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical rdkcentral CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.16

Max CVSS: 8.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 18
4.0-6.9 3
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS rdkcentral CVEs

These are the five CVEs with the highest CVSS scores for rdkcentral, sorted by severity first and recency.

All CVEs for rdkcentral

CVE-2025-20635 rdkcentral vulnerability CVSS: 0 03 Feb 2025, 04:15 UTC

In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09403752; Issue ID: MSV-2434.

CVE-2024-20089 rdkcentral vulnerability CVSS: 0 02 Sep 2024, 05:15 UTC

In wlan, there is a possible denial of service due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08861558; Issue ID: MSV-1526.

CVE-2024-20085 rdkcentral vulnerability CVSS: 0 02 Sep 2024, 05:15 UTC

In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944204; Issue ID: MSV-1560.

CVE-2024-20084 rdkcentral vulnerability CVSS: 0 02 Sep 2024, 05:15 UTC

In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944210; Issue ID: MSV-1561.

CVE-2024-20081 rdkcentral vulnerability CVSS: 0 01 Jul 2024, 05:15 UTC

In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08719602; Issue ID: MSV-1412.

CVE-2024-20022 rdkcentral vulnerability CVSS: 0 04 Mar 2024, 03:15 UTC

In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255.

CVE-2024-20006 rdkcentral vulnerability CVSS: 0 05 Feb 2024, 06:15 UTC

In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477148; Issue ID: ALPS08477148.

CVE-2023-32855 rdkcentral vulnerability CVSS: 0 04 Dec 2023, 04:15 UTC

In aee, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07909204; Issue ID: ALPS07909204.

CVE-2023-20832 rdkcentral vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08013530.

CVE-2023-20831 rdkcentral vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014162.

CVE-2023-20830 rdkcentral vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014156.

CVE-2023-20829 rdkcentral vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014148.

CVE-2023-20828 rdkcentral vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014144.

CVE-2023-20821 rdkcentral vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937113; Issue ID: ALPS07937113.

CVE-2023-20796 rdkcentral vulnerability CVSS: 0 07 Aug 2023, 04:15 UTC

In power, there is a possible memory corruption due to an incorrect bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929790; Issue ID: ALPS07929790.

CVE-2023-20790 rdkcentral vulnerability CVSS: 0 07 Aug 2023, 04:15 UTC

In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07740194; Issue ID: ALPS07740194.

CVE-2023-20725 rdkcentral vulnerability CVSS: 0 06 Jun 2023, 13:15 UTC

In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only); Issue ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only).

CVE-2023-20726 rdkcentral vulnerability CVSS: 0 15 May 2023, 22:15 UTC

In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only); Issue ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only).

CVE-2019-6964 rdkcentral vulnerability CVSS: 6.5 20 Jun 2019, 14:15 UTC

A heap-based buffer over-read in Service_SetParamStringValue in cosa_x_cisco_com_ddns_dml.c of the RDK RDKB-20181217-1 CcspPandM module may allow attackers with login credentials to achieve information disclosure and code execution by crafting an AJAX call responsible for DDNS configuration with an exactly 64-byte username, password, or domain, for which the buffer size is insufficient for the final '\0' character. This is related to the CcspCommonLibrary and WebUI modules.

CVE-2019-6963 rdkcentral vulnerability CVSS: 6.5 20 Jun 2019, 14:15 UTC

A heap-based buffer overflow in cosa_dhcpv4_dml.c in the RDK RDKB-20181217-1 CcspPandM module may allow attackers with login credentials to achieve remote code execution by crafting a long buffer in the "Comment" field of an IP reservation form in the admin panel. This is related to the CcspCommonLibrary module.

CVE-2019-6962 rdkcentral vulnerability CVSS: 8.5 20 Jun 2019, 14:15 UTC

A shell injection issue in cosa_wifi_apis.c in the RDK RDKB-20181217-1 CcspWifiAgent module allows attackers with login credentials to execute arbitrary shell commands under the CcspWifiSsp process (running as root) if the platform was compiled with the ENABLE_FEATURE_MESHWIFI macro. The attack is conducted by changing the Wi-Fi network password to include crafted escape characters. This is related to the WebUI module.

CVE-2019-6961 rdkcentral vulnerability CVSS: 4.0 20 Jun 2019, 14:15 UTC

Incorrect access control in actionHandlerUtility.php in the RDK RDKB-20181217-1 WebUI module allows a logged in user to control DDNS, QoS, RIP, and other privileged configurations (intended only for the network operator) by sending an HTTP POST to the PHP backend, because the page filtering for non-superuser (in header.php) is done only for GET requests and not for direct AJAX calls.