CVE-2022-20234

In Car Settings app, the NotificationAccessConfirmationActivity is exported. In NotificationAccessConfirmationActivity, it gets both 'mComponentName' and 'pkgTitle' from user.An unprivileged app can use a malicous mComponentName with a benign pkgTitle (e.g. Settings app) to make users enable notification access permission for the malicious app. That is, users believe they enable the notification access permission for the Settings app, but actually they enable the notification access permission for the malicious app.Once the malicious app gets the notification access permission, it can read all notifications, including users' personal information.Product: AndroidVersions: Android-12LAndroid ID: A-225189301
Configurations

Configuration 1 (hide)

cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*

History

21 Nov 2024, 06:42

Type Values Removed Values Added
References () https://source.android.com/security/bulletin/aaos/2022-07-01 - Patch, Vendor Advisory () https://source.android.com/security/bulletin/aaos/2022-07-01 - Patch, Vendor Advisory

Information

Published : 2022-07-13 19:15

Updated : 2024-11-21 06:42


NVD link : CVE-2022-20234

Mitre link : CVE-2022-20234

CVE.ORG link : CVE-2022-20234


JSON object : View

Products Affected

google

  • android
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource