First published: Wed Feb 09 2022(Updated: )
In vow driver, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05837793; Issue ID: ALPS05837793.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =10.0 | |
Android | =11.0 | |
Android | =12.0 | |
MediaTek MT6781 | ||
MediaTek MT6785T | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6853T | ||
MediaTek MT6873 | ||
MediaTek MT6877 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6891 | ||
MediaTek MT6893 | ||
MediaTek MT8185 | ||
MediaTek MT8789 | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8797 WiFi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20030 has a medium severity rating due to a stack-based buffer overflow that can lead to local privilege escalation.
To fix CVE-2022-20030, users should apply the security patch ID ALPS05837793 provided for their affected Android versions.
CVE-2022-20030 affects Android versions 10.0, 11.0, and 12.0.
No, user interaction is not required to exploit CVE-2022-20030.
Exploiting CVE-2022-20030 could allow an attacker to gain elevated system execution privileges.