CVE-2022-20125Google Android vulnerability

4 documents4 sources
Severity
6.8MEDIUMNVD
EPSS
0.0%
top 97.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 15
Latest updateJun 16

Description

In GBoard, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-194402515

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 0.9 | Impact: 5.9

Affected Packages4 packages

CVEListV5google/androidAndroid-10 Android-11 Android-12 Android-12L
NVDgoogle/android4 versions+3

🔴Vulnerability Details

2
GHSA
GHSA-rwwv-m5jx-g9xw: In GBoard, there is a possible way to bypass factory reset protections due to a sandbox escape2022-06-16
OSV
CVE-2022-20125: In GBoard, there is a possible way to bypass factory reset protections due to a sandbox escape2022-06-01

📋Vendor Advisories

1
Android
CVE-2022-20125: Android Security Bulletin 2022-06-01 CVE: CVE-2022-20125 Severity: HIGH Type: EoP Affected AOSP versions: 10, 11, 12, 12L References: A-1944025152022-06-01