First published: Tue May 03 2022(Updated: )
In telephony, there is a possible way to disable receiving SMS messages due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06498868; Issue ID: ALPS06498868.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =10.0 | |
Google Android | =11.0 | |
Google Android | =12.0 | |
Mediatek Mt6731 | ||
Mediatek Mt6732 | ||
Mediatek Mt6735 | ||
Mediatek Mt6737 | ||
Mediatek Mt6739 | ||
Mediatek Mt6750 | ||
Mediatek Mt6750s | ||
Mediatek Mt6752 | ||
Mediatek Mt6753 | ||
Mediatek Mt6755 | ||
Mediatek Mt6755s | ||
Mediatek Mt6757 | ||
Mediatek Mt6757c | ||
Mediatek Mt6757cd | ||
Mediatek Mt6757ch | ||
Google Android | ||
Mediatek Mt6761 | ||
Mediatek Mt6762 | ||
Mediatek Mt6763 | ||
Mediatek Mt6765 | ||
Mediatek Mt6768 | ||
Mediatek Mt6769 | ||
Mediatek Mt6771 | ||
Mediatek Mt6779 | ||
Mediatek Mt6781 | ||
Mediatek Mt6785 | ||
Mediatek Mt6789 | ||
Mediatek Mt6795 | ||
Google Android | ||
Mediatek Mt6799 | ||
Mediatek Mt6833 | ||
Mediatek Mt6853 | ||
Mediatek Mt6853t | ||
Mediatek Mt6873 | ||
Mediatek Mt6875 | ||
Mediatek Mt6877 | ||
Mediatek Mt6879 | ||
Mediatek Mt6883 | ||
Mediatek Mt6885 | ||
Mediatek Mt6889 | ||
Mediatek Mt6891 | ||
Mediatek Mt6893 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt6985 | ||
Mediatek Mt8321 | ||
Mediatek Mt8666 | ||
Mediatek Mt8675 | ||
Mediatek Mt8765 | ||
Mediatek Mt8766 | ||
Mediatek Mt8768 | ||
Mediatek Mt8786 | ||
Mediatek Mt8788 | ||
Mediatek Mt8789 | ||
Mediatek Mt8791 | ||
Mediatek Mt8797 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this telephony vulnerability is CVE-2022-20093.
The severity of CVE-2022-20093 is high with a CVSS score of 7.8.
The affected software includes Google Android versions 10.0, 11.0, and 12.0.
This vulnerability can be exploited without user interaction.
To fix CVE-2022-20093, apply the patch with ID ALPS06498868 provided by the vendor.