Versio.io

CVE-2022-20109

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 03-05-2022 10:15
Last modified: - 11-05-2022 05:50
Total changes: - 3

Description

In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
7.8
Base score
1.8
5.9
Exploitability score
Impact score
 

Verification logic

AND
OR
vendor=google AND product=android AND version=9.0
vendor=google AND product=android AND version=10.0
vendor=google AND product=android AND version=11.0
vendor=google AND product=android AND version=12.0
OR
vendor=mediatek AND product=mt6757 AND version=-
vendor=mediatek AND product=mt6785 AND version=-
vendor=mediatek AND product=mt6779 AND version=-
vendor=mediatek AND product=mt6768 AND version=-
vendor=mediatek AND product=mt6769 AND version=-
vendor=mediatek AND product=mt6761 AND version=-
vendor=mediatek AND product=mt6765 AND version=-
vendor=mediatek AND product=mt6762 AND version=-
vendor=mediatek AND product=mt6771 AND version=-
vendor=mediatek AND product=mt6739 AND version=-
vendor=mediatek AND product=mt6580 AND version=-
vendor=mediatek AND product=mt6735 AND version=-
vendor=mediatek AND product=mt6737 AND version=-
vendor=mediatek AND product=mt6750 AND version=-
vendor=mediatek AND product=mt6750s AND version=-
vendor=mediatek AND product=mt6753 AND version=-
vendor=mediatek AND product=mt6757c AND version=-
vendor=mediatek AND product=mt6757cd AND version=-
vendor=mediatek AND product=mt6757ch AND version=-
vendor=mediatek AND product=mt6763 AND version=-
vendor=mediatek AND product=mt6833 AND version=-
vendor=mediatek AND product=mt6853 AND version=-
vendor=mediatek AND product=mt6853t AND version=-
vendor=mediatek AND product=mt6873 AND version=-
vendor=mediatek AND product=mt6875 AND version=-
vendor=mediatek AND product=mt6877 AND version=-
vendor=mediatek AND product=mt6883 AND version=-
vendor=mediatek AND product=mt6885 AND version=-
vendor=mediatek AND product=mt6889 AND version=-
vendor=mediatek AND product=mt6797 AND version=-
vendor=mediatek AND product=mt6781 AND version=-
vendor=mediatek AND product=mt6893 AND version=-
vendor=mediatek AND product=mt8167 AND version=-
vendor=mediatek AND product=mt8168 AND version=-
vendor=mediatek AND product=mt8173 AND version=-
vendor=mediatek AND product=mt8185 AND version=-
vendor=mediatek AND product=mt8321 AND version=-
vendor=mediatek AND product=mt8362a AND version=-
vendor=mediatek AND product=mt8365 AND version=-
vendor=mediatek AND product=mt8385 AND version=-
vendor=mediatek AND product=mt8666 AND version=-
vendor=mediatek AND product=mt8675 AND version=-
vendor=mediatek AND product=mt8695 AND version=-
vendor=mediatek AND product=mt8696 AND version=-
vendor=mediatek AND product=mt8765 AND version=-
vendor=mediatek AND product=mt8766 AND version=-
vendor=mediatek AND product=mt8768 AND version=-
vendor=mediatek AND product=mt8786 AND version=-
vendor=mediatek AND product=mt8788 AND version=-
vendor=mediatek AND product=mt8789 AND version=-
vendor=mediatek AND product=mt8791 AND version=-
vendor=mediatek AND product=mt8797 AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2022-20109

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.