Логотип exploitDog
bind:CVE-2022-20302
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-20302

Количество 2

Количество 2

nvd логотип

CVE-2022-20302

больше 3 лет назад

In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200746457

CVSS3: 7.6
EPSS: Низкий
github логотип

GHSA-hrm5-m82q-59wm

больше 3 лет назад

In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200746457

CVSS3: 7.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-20302

In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200746457

CVSS3: 7.6
0%
Низкий
больше 3 лет назад
github логотип
GHSA-hrm5-m82q-59wm

In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200746457

CVSS3: 7.6
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу