CVE-2022-20491Improper Validation of Specified Quantity in Input in Google Android

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 13

Description

In NotificationChannel of NotificationChannel.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703556

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5google/androidAndroid-10 Android-11 Android-12 Android-12L Android-13
NVDgoogle/android5 versions+4
Androidplatform/frameworks_base10:010:2022-12-01+4

🔴Vulnerability Details

3
OSV
CVE-2022-20491: In NotificationChannel of NotificationChannel2022-12-13
GHSA
GHSA-h97p-r383-p42m: In NotificationChannel of NotificationChannel2022-12-13
OSV
CVE-2022-20491: In NotificationChannel of NotificationChannel2022-12-01

📋Vendor Advisories

1
Android
CVE-2022-20491: Android Security Bulletin 2022-12-01 CVE: CVE-2022-20491 Severity: HIGH Type: EoP Affected AOSP versions: 10, 11, 12, 12L, 13 References: A-2427035562022-12-01