First published: Mon Aug 01 2022(Updated: )
In startSync of AbstractThreadedSyncAdapter.java, there is a possible way to access protected content of content providers due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-203229608
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =10.0 | |
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20358 is a vulnerability in the AbstractThreadedSyncAdapter.java file of Google Android, which could allow an attacker to access protected content of content providers without proper permission checks.
CVE-2022-20358 has a severity rating of 3.3, indicating a high severity.
CVE-2022-20358 affects Google Android versions 10.0, 11.0, 12.0, and 12.1.
No, exploitation of CVE-2022-20358 requires user execution privileges.
To mitigate CVE-2022-20358, update to the latest version of Google Android and apply any available patches or security updates.