CVE-2022-20034 (GCVE-0-2022-20034)
Vulnerability from cvelistv5 – Published: 2022-02-09 22:05 – Updated: 2024-08-03 01:55
VLAI?
Summary
In Preloader XFLASH, there is a possible escalation of privilege due to an improper certificate validation. This could lead to local escalation of privilege for an attacker who has physical access to the device with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160806.
Severity ?
No CVSS data available.
CWE
- Elevation of Privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MediaTek, Inc. | MT6580, MT6735, MT6739, MT6761, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6799, MT6833, MT6853, MT6873, MT6875, MT6877, MT6885, MT6891, MT6893 |
Affected:
Android 11.0
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:55:46.233Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "MT6580, MT6735, MT6739, MT6761, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6799, MT6833, MT6853, MT6873, MT6875, MT6877, MT6885, MT6891, MT6893",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "Android 11.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Preloader XFLASH, there is a possible escalation of privilege due to an improper certificate validation. This could lead to local escalation of privilege for an attacker who has physical access to the device with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160806."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-09T22:05:39",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mediatek.com",
"ID": "CVE-2022-20034",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "MT6580, MT6735, MT6739, MT6761, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6799, MT6833, MT6853, MT6873, MT6875, MT6877, MT6885, MT6891, MT6893",
"version": {
"version_data": [
{
"version_value": "Android 11.0"
}
]
}
}
]
},
"vendor_name": "MediaTek, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Preloader XFLASH, there is a possible escalation of privilege due to an improper certificate validation. This could lead to local escalation of privilege for an attacker who has physical access to the device with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160806."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://corp.mediatek.com/product-security-bulletin/February-2022",
"refsource": "MISC",
"url": "https://corp.mediatek.com/product-security-bulletin/February-2022"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2022-20034",
"datePublished": "2022-02-09T22:05:39",
"dateReserved": "2021-10-12T00:00:00",
"dateUpdated": "2024-08-03T01:55:46.233Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"109DD7FD-3A48-4C3D-8E1A-4433B98E1E64\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46F71838-4E50-4F2A-9EB8-30AE5DF8511E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C82E144B-0BAD-47E1-A657-3A5880988FE2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FA8A390-9F52-4CF3-9B45-936CE3E2B828\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F726F486-A86F-4215-AD93-7A07A071844A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F19C76A-50DF-4ACA-BACA-07157B4D838B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06CD97E1-8A76-48B4-9780-9698EF5A960F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D23991D5-1893-49F4-8A06-D5E66C96C3B3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE4D2AED-C713-407F-A34A-52C3D8F65835\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBA369B8-8E23-492B-82CC-23114E6A5D1C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4EEE021-6B2A-47A0-AC6B-55525A40D718\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A82E0A4F-072F-474C-B94C-8114ABE05639\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9814939B-F05E-4870-90C0-7C0F6BAAEB39\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"366F1912-756B-443E-9962-224937DD7DFB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD64413C-C774-4C4F-9551-89E1AA9469EE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8E91CA4-CA5B-40D1-9A96-2B875104BCF4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"213B5C7F-D965-4312-9CDF-4F06FA77D401\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In Preloader XFLASH, there is a possible escalation of privilege due to an improper certificate validation. This could lead to local escalation of privilege for an attacker who has physical access to the device with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160806.\"}, {\"lang\": \"es\", \"value\": \"En Preloader XFLASH, se presenta una posible escalada de privilegios debido a una comprobaci\\u00f3n inapropiada del certificado. Esto podr\\u00eda conllevar a una escalada local de privilegios para un atacante que tenga acceso f\\u00edsico al dispositivo remota sin ser requeridos privilegios de ejecuci\\u00f3n adicionales. No es requerida una interacci\\u00f3n del usuario para su explotaci\\u00f3n. ID del Parche: ALPS06160806; ID de Incidencia: ALPS06160806\"}]",
"id": "CVE-2022-20034",
"lastModified": "2024-11-21T06:41:59.670",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-02-09T23:15:17.277",
"references": "[{\"url\": \"https://corp.mediatek.com/product-security-bulletin/February-2022\", \"source\": \"security@mediatek.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://corp.mediatek.com/product-security-bulletin/February-2022\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mediatek.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-295\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-20034\",\"sourceIdentifier\":\"security@mediatek.com\",\"published\":\"2022-02-09T23:15:17.277\",\"lastModified\":\"2024-11-21T06:41:59.670\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Preloader XFLASH, there is a possible escalation of privilege due to an improper certificate validation. This could lead to local escalation of privilege for an attacker who has physical access to the device with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160806.\"},{\"lang\":\"es\",\"value\":\"En Preloader XFLASH, se presenta una posible escalada de privilegios debido a una comprobaci\u00f3n inapropiada del certificado. Esto podr\u00eda conllevar a una escalada local de privilegios para un atacante que tenga acceso f\u00edsico al dispositivo remota sin ser requeridos privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID del Parche: ALPS06160806; ID de Incidencia: ALPS06160806\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109DD7FD-3A48-4C3D-8E1A-4433B98E1E64\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F71838-4E50-4F2A-9EB8-30AE5DF8511E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C82E144B-0BAD-47E1-A657-3A5880988FE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FA8A390-9F52-4CF3-9B45-936CE3E2B828\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F726F486-A86F-4215-AD93-7A07A071844A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F19C76A-50DF-4ACA-BACA-07157B4D838B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CD97E1-8A76-48B4-9780-9698EF5A960F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D23991D5-1893-49F4-8A06-D5E66C96C3B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE4D2AED-C713-407F-A34A-52C3D8F65835\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA369B8-8E23-492B-82CC-23114E6A5D1C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4EEE021-6B2A-47A0-AC6B-55525A40D718\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82E0A4F-072F-474C-B94C-8114ABE05639\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0CAAE1-2BC9-49CA-AC68-2217A4258BDD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9814939B-F05E-4870-90C0-7C0F6BAAEB39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"366F1912-756B-443E-9962-224937DD7DFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD64413C-C774-4C4F-9551-89E1AA9469EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8E91CA4-CA5B-40D1-9A96-2B875104BCF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B5C7F-D965-4312-9CDF-4F06FA77D401\"}]}]}],\"references\":[{\"url\":\"https://corp.mediatek.com/product-security-bulletin/February-2022\",\"source\":\"security@mediatek.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://corp.mediatek.com/product-security-bulletin/February-2022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…