Description
In GBoard, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-194402515
Published: 2022-06-15
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-25385 In GBoard, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-194402515
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published:

Updated: 2024-08-03T02:02:30.619Z

Reserved: 2021-10-14T00:00:00.000Z

Link: CVE-2022-20125

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-15T13:15:08.457

Modified: 2024-11-21T06:42:12.470

Link: CVE-2022-20125

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses