First published: Mon Dec 05 2022(Updated: )
In several functions that parse avrc response in avrc_pars_ct.cc and related files, there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242459126
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =10.0 | |
Android | =11.0 | |
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | ||
=10.0 | ||
=11.0 | ||
=12.0 | ||
=12.1 | ||
=13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20483 has a medium severity level due to its potential for remote information disclosure.
To mitigate CVE-2022-20483, users should update their Android device to the latest version that addresses this vulnerability.
CVE-2022-20483 affects Android versions 10.0, 11.0, 12.0, 12.1, and 13.0.
No, CVE-2022-20483 does not require user interaction for exploitation.
CVE-2022-20483 is a vulnerability that involves possible out-of-bounds reads due to integer overflows.