In Car Settings app, the NotificationAccessConfirmationActivity is exported. In NotificationAccessConfirmationActivity, it gets both 'mComponentName' and 'pkgTitle' from user.An unprivileged app can use a malicous mComponentName with a benign pkgTitle (e.g. Settings app) to make users enable notification access permission for the malicious app. That is, users believe they enable the notification access permission for the Settings app, but actually they enable the notification access permission for the malicious app.Once the malicious app gets the notification access permission, it can read all notifications, including users' personal information.Product: AndroidVersions: Android-12LAndroid ID: A-225189301
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/aaos/2022-07-01 | Patch Vendor Advisory |
https://source.android.com/security/bulletin/aaos/2022-07-01 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 06:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://source.android.com/security/bulletin/aaos/2022-07-01 - Patch, Vendor Advisory |
Information
Published : 2022-07-13 19:15
Updated : 2024-11-21 06:42
NVD link : CVE-2022-20234
Mitre link : CVE-2022-20234
CVE.ORG link : CVE-2022-20234
JSON object : View
Products Affected
- android
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource