CVE-2022-20338

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to create a specially crafted URI that can bypass normal checks, potentially leading to unauthorized access to certain system resources. It affects Android versions 11 and 12, and can be exploited without needing any special permissions or user interaction.

Technical Description

In HierarchicalUri.readFrom of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to a local escalation of privilege, preventing processes from validating URIs correctly, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-171966843

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$437($100-$500)
Vendor Response
Grade FPatched in 1302 days

Quick Information

Published

Aug 12, 2022

over 3 years ago

Last Modified

Mar 6, 2026

about 1 month ago

Vendor

google

Product

android