First published: Mon Dec 05 2022(Updated: )
In updatePublicMode of NotificationLockscreenUserManagerImpl.java, there is a possible way to reveal sensitive notifications on the lockscreen due to an incorrect state transition. This could lead to local information disclosure with physical access required and an app that runs above the lockscreen, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-246301979
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20497 has been classified as a moderate severity vulnerability due to potential local information disclosure.
To mitigate CVE-2022-20497, users should update their Android device to the latest version available that addresses this vulnerability.
Exploitation of CVE-2022-20497 requires physical access to the device.
The main risk associated with CVE-2022-20497 is the potential exposure of sensitive notifications on the lockscreen.
CVE-2022-20497 affects Android versions 12.0, 12.1, and 13.0.