CVE-2022-20230Improper Encoding or Escaping of Output in Packages Apps Keychain

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 13
Latest updateJul 14

Description

In choosePrivateKeyAlias of KeyChain.java, there is a possible access to the user's certificate due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-221859869

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5google/androidAndroid-10 Android-11 Android-12 Android-12L
NVDgoogle/android4 versions+3
Androidplatform/packages_apps_keychain10:010:2022-07-01+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-rc4m-xrpj-h9xf: In choosePrivateKeyAlias of KeyChain2022-07-14
OSV
CVE-2022-20230: In choosePrivateKeyAlias of KeyChain2022-07-01

📋Vendor Advisories

1
Android
CVE-2022-20230: Android Security Bulletin 2022-07-01 CVE: CVE-2022-20230 Severity: HIGH Type: ID Affected AOSP versions: 10, 11, 12, 12L References: A-2218598692022-07-01