In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200746457
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://source.android.com/security/bulletin/android-13 |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-08-03T02:10:44.346Z
Reserved: 2021-10-14T00:00:00
Link: CVE-2022-20302
No data.
Status : Modified
Published: 2022-08-12T15:15:11.570
Modified: 2024-11-21T06:42:32.993
Link: CVE-2022-20302
No data.
OpenCVE Enrichment
No data.
Weaknesses