CVE-2022-20423Integer Overflow or Wraparound in Google Android

Severity
4.6MEDIUMNVD
EPSS
0.1%
top 77.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 11
Latest updateApr 13

Description

In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 0.9 | Impact: 3.6

Affected Packages3 packages

Debianlinux/linux_kernel< 5.10.113-1+3
debiandebian/linux< linux 5.16.18-1 (bookworm)

Patches

🔴Vulnerability Details

5
VulDB
Google Android USB Device rndis.c rndis_set_response out-of-bounds write (A-239842288 / EUVD-2022-25683)2026-04-13
VulDB
Google Android integer overflow (A-239842288 / EUVD-2022-25683)2026-04-13
GHSA
GHSA-9994-rx95-frv3: In rndis_set_response of rndis2022-10-12
OSV
CVE-2022-20423: In rndis_set_response of rndis2022-10-11
OSV
CVE-2022-20423: In rndis_set_response of rndis2022-10-01

📋Vendor Advisories

3
CISA ICS
Siemens SIMATIC2024-03-14
Android
CVE-2022-20423: USB2022-10-01
Debian
CVE-2022-20423: linux - In rndis_set_response of rndis.c, there is a possible out of bounds write due to...2022