Lucene search

K
cve[email protected]CVE-2022-20111
HistoryMay 03, 2022 - 9:15 p.m.

CVE-2022-20111

2022-05-0321:15:09
CWE-755
web.nvd.nist.gov
63
3
cve-2022-20111
ion
use after free
local escalation
privilege escalation
error handling
patch
nvd

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

8.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.7%

In ion, there is a possible use after free due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06366069; Issue ID: ALPS06366069.

Affected configurations

Vulners
NVD
Node
googleandroidRange<9.0
OR
googleandroidRange<10.0
OR
googleandroidRange<11.0
OR
googleandroidRange<12.0
OR
mediatekmt6580
OR
mediatekmt6735
OR
mediatekmt6737
OR
mediatekmt6739
OR
mediatekmt6750
OR
mediatekmt6750s
OR
mediatekmt6753
OR
mediatekmt6757
OR
mediatekmt6757c
OR
mediatekmt6757cd
OR
mediatekmt6757ch
OR
mediatekmt6761
OR
mediatekmt6762
OR
mediatekmt6763
OR
mediatekmt6765
OR
mediatekmt6768
OR
mediatekmt6769
OR
mediatekmt6771
OR
mediatekmt6779
OR
mediatekmt6781
OR
mediatekmt6785
OR
mediatekmt6797
OR
mediatekmt6833
OR
mediatekmt6853
OR
mediatekmt6853t
OR
mediatekmt6873
OR
mediatekmt6875
OR
mediatekmt6877
OR
mediatekmt6883
OR
mediatekmt6885
OR
mediatekmt6889
OR
mediatekmt6893
OR
mediatekmt8167
OR
mediatekmt8168
OR
mediatekmt8173
OR
mediatekmt8185
OR
mediatekmt8321
OR
mediatekmt8362a
OR
mediatekmt8365
OR
mediatekmt8385
OR
mediatekmt8666
OR
mediatekmt8675
OR
mediatekmt8695
OR
mediatekmt8696
OR
mediatekmt8765
OR
mediatekmt8766
OR
mediatekmt8768
OR
mediatekmt8786
OR
mediatekmt8788
OR
mediatekmt8789
OR
mediatekmt8791
OR
mediatekmt8797
VendorProductVersionCPE
googleandroid*cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
googleandroid*cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
googleandroid*cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
googleandroid*cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
mediatekmt6580*cpe:2.3:h:mediatek:mt6580:*:*:*:*:*:*:*:*
mediatekmt6735*cpe:2.3:h:mediatek:mt6735:*:*:*:*:*:*:*:*
mediatekmt6737*cpe:2.3:h:mediatek:mt6737:*:*:*:*:*:*:*:*
mediatekmt6739*cpe:2.3:h:mediatek:mt6739:*:*:*:*:*:*:*:*
mediatekmt6750*cpe:2.3:h:mediatek:mt6750:*:*:*:*:*:*:*:*
mediatekmt6750s*cpe:2.3:h:mediatek:mt6750s:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 561

CNA Affected

[
  {
    "product": "MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797",
    "vendor": "MediaTek, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "Android 9.0, 10.0, 11.0, 12.0"
      }
    ]
  }
]

Social References

More

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

8.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.7%

Related for CVE-2022-20111