CVE-2022-20396Insufficient Verification of Data Authenticity in Google Android

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 99.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 13
Latest updateSep 14

Description

In SettingsActivity.java, there is a possible way to make a device discoverable over Bluetooth, without permission or user interaction, due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-234440688

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5google/androidAndroid-12L Android-13
NVDgoogle/android12.1, 13.0+1
Androidplatform/packages_apps_settings13-next:013-next:2022-09-01+2

Patches

🔴Vulnerability Details

3
GHSA
GHSA-385f-2j86-w7g5: In SettingsActivity2022-09-14
CVEList
CVE-2022-20396: In SettingsActivity2022-09-13
OSV
CVE-2022-20396: In SettingsActivity2022-09-01

📋Vendor Advisories

1
Android
CVE-2022-20396: Android Security Bulletin 2022-09-01 CVE: CVE-2022-20396 Severity: HIGH Type: ID Affected AOSP versions: 12L, 13 References: A-2344406882022-09-01
CVE-2022-20396 — Google Android vulnerability | cvebase