First published: Mon Dec 05 2022(Updated: )
In NotificationChannel of NotificationChannel.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242702851
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =10.0 | |
Android | =11.0 | |
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | ||
=10.0 | ||
=11.0 | ||
=12.0 | ||
=12.1 | ||
=13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-20484 is classified as high due to the potential for local escalation of privilege.
Fixing CVE-2022-20484 requires updating to the latest security patch provided by Google for the affected Android versions.
CVE-2022-20484 affects Android versions 10.0, 11.0, 12.0, 12.1, and 13.0.
No, user interaction is not needed to exploit CVE-2022-20484, making it more critical.
Exploitation of CVE-2022-20484 could lead to unauthorized privilege escalation on the device.