First published: Fri Dec 16 2022(Updated: )
In registerReceivers of DeviceCapabilityListener.java, there is a possible way to change preferred TTY mode due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-236264289
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20558 has been assigned a severity level categorized as high.
To fix CVE-2022-20558, ensure your Android device is updated to a version that includes the patch.
CVE-2022-20558 affects devices running Android version 13.0.
CVE-2022-20558 is a local privilege escalation vulnerability due to a permissions bypass.
No, user interaction is not needed for the exploitation of CVE-2022-20558.