First published: Mon Jun 06 2022(Updated: )
In startLegacyVpnPrivileged of Vpn.java, there is a possible way to retrieve VPN credentials due to a protocol downgrade attack. This could lead to remote escalation of privilege if a malicious Wi-Fi AP is used, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-201660636
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20145 is classified as a high severity vulnerability due to the potential for remote escalation of privilege.
To fix CVE-2022-20145, users should update their Android device to a patched version beyond Android 11.0.
CVE-2022-20145 exposes users to a protocol downgrade attack that can retrieve VPN credentials.
No, user interaction is not needed for the exploitation of CVE-2022-20145.
CVE-2022-20145 affects Google Android version 11.0.