First published: Mon Mar 06 2023(Updated: )
In validateForCommonR1andR2 of PasspointConfiguration.java, uncaught errors in parsing stored configs could lead to local persistent denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-246539931
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | ||
=12.0 | ||
=12.1 | ||
=13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-20499.
The severity of CVE-2022-20499 is high.
The affected software of CVE-2022-20499 is Google Android versions 12.0, 12.1, and 13.0.
CVE-2022-20499 can be exploited by uncaught errors in parsing stored configs, leading to a local persistent denial of service.
No, user interaction is not needed for the exploitation of CVE-2022-20499.