CVE-2022-20481 — Sensitive Information Exposure in Frameworks OPT NET Wifi
6 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 88.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 28
Latest updateApr 16
Description
In multiple files, there is a possible way to preserve WiFi settings due to residual data after a reset. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-241927115
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
🔴Vulnerability Details
4VulDB▶
Google Android 10.0/11.0/12.0/13.0 WiFi Setting information disclosure (A-241927115 / EUVD-2022-25741)↗2026-04-16
GHSA▶
GHSA-c942-38wm-6p4x: In multiple files, there is a possible way to preserve WiFi settings due to residual data after a reset↗2023-02-28
CVEList▶
CVE-2022-20481: In multiple files, there is a possible way to preserve WiFi settings due to residual data after a reset↗2023-02-28
OSV▶
CVE-2022-20481: In multiple files, there is a possible way to preserve WiFi settings due to residual data after a reset↗2023-02-01
📋Vendor Advisories
1Android▶
CVE-2022-20481: Android Security Bulletin 2023-02-01
CVE: CVE-2022-20481
Severity: HIGH
Type: ID
Affected AOSP versions: 10, 11, 12, 12L, 13
References: A-241927115↗2023-02-01