Versio.io

CVE-2022-20053

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 10-03-2022 06:45
Last modified: - 17-03-2022 07:06
Total changes: - 2

Description

In ims service, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219097; Issue ID: ALPS06219097.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
7.8
Base score
1.8
5.9
Exploitability score
Impact score
 

Verification logic

AND
OR
vendor=google AND product=android AND version=9.0
vendor=google AND product=android AND version=10.0
vendor=google AND product=android AND version=11.0
vendor=google AND product=android AND version=12.0
OR
vendor=mediatek AND product=mt6731 AND version=-
vendor=mediatek AND product=mt6732 AND version=-
vendor=mediatek AND product=mt6735 AND version=-
vendor=mediatek AND product=mt6737 AND version=-
vendor=mediatek AND product=mt6739 AND version=-
vendor=mediatek AND product=mt6750 AND version=-
vendor=mediatek AND product=mt6750s AND version=-
vendor=mediatek AND product=mt6752 AND version=-
vendor=mediatek AND product=mt6753 AND version=-
vendor=mediatek AND product=mt6755 AND version=-
vendor=mediatek AND product=mt6755s AND version=-
vendor=mediatek AND product=mt6757 AND version=-
vendor=mediatek AND product=mt6758 AND version=-
vendor=mediatek AND product=mt6761 AND version=-
vendor=mediatek AND product=mt6762 AND version=-
vendor=mediatek AND product=mt6763 AND version=-
vendor=mediatek AND product=mt6765 AND version=-
vendor=mediatek AND product=mt6768 AND version=-
vendor=mediatek AND product=mt6769 AND version=-
vendor=mediatek AND product=mt6771 AND version=-
vendor=mediatek AND product=mt6779 AND version=-
vendor=mediatek AND product=mt6781 AND version=-
vendor=mediatek AND product=mt6785 AND version=-
vendor=mediatek AND product=mt6795 AND version=-
vendor=mediatek AND product=mt6797 AND version=-
vendor=mediatek AND product=mt6799 AND version=-
vendor=mediatek AND product=mt6833 AND version=-
vendor=mediatek AND product=mt6853 AND version=-
vendor=mediatek AND product=mt6853t AND version=-
vendor=mediatek AND product=mt6873 AND version=-
vendor=mediatek AND product=mt6875 AND version=-
vendor=mediatek AND product=mt6877 AND version=-
vendor=mediatek AND product=mt6880 AND version=-
vendor=mediatek AND product=mt6883 AND version=-
vendor=mediatek AND product=mt6885 AND version=-
vendor=mediatek AND product=mt6889 AND version=-
vendor=mediatek AND product=mt6890 AND version=-
vendor=mediatek AND product=mt6891 AND version=-
vendor=mediatek AND product=mt6893 AND version=-
vendor=mediatek AND product=mt8167 AND version=-
vendor=mediatek AND product=mt8168 AND version=-
vendor=mediatek AND product=mt8173 AND version=-
vendor=mediatek AND product=mt8183 AND version=-
vendor=mediatek AND product=mt8185 AND version=-
vendor=mediatek AND product=mt8321 AND version=-
vendor=mediatek AND product=mt8362a AND version=-
vendor=mediatek AND product=mt8365 AND version=-
vendor=mediatek AND product=mt8385 AND version=-
vendor=mediatek AND product=mt8666 AND version=-
vendor=mediatek AND product=mt8667 AND version=-
vendor=mediatek AND product=mt8675 AND version=-
vendor=mediatek AND product=mt8765 AND version=-
vendor=mediatek AND product=mt8766 AND version=-
vendor=mediatek AND product=mt8768 AND version=-
vendor=mediatek AND product=mt8786 AND version=-
vendor=mediatek AND product=mt8788 AND version=-
vendor=mediatek AND product=mt8789 AND version=-
vendor=mediatek AND product=mt8791 AND version=-
vendor=mediatek AND product=mt8797 AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2022-20053

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.