CVE-2022-20019: Information Disclosure in MediaTek, Inc. MT6595, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8768
In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.
AI Analysis
Technical Summary
CVE-2022-20019 is an information disclosure vulnerability found in MediaTek's libMtkOmxGsmDec component, which is part of the multimedia framework on a wide range of MediaTek System-on-Chips (SoCs) including MT6595, MT6735, MT6737, MT6739, MT6750 series, MT676x series, MT677x series, MT678x series, MT679x series, MT68xx series, and MT8768. These SoCs are commonly integrated into Android devices running versions 10.0 and 11.0. The vulnerability arises from an incorrect bounds check in the libMtkOmxGsmDec library, which can lead to local information disclosure. Exploitation does not require additional execution privileges or user interaction, making it easier for a local attacker or malicious app with limited privileges to extract sensitive information from the device. The vulnerability is classified under CWE-20 (Improper Input Validation), indicating that the component fails to properly validate input data, leading to potential leakage of information. The CVSS v3.1 base score is 5.5 (medium severity), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires local access with low complexity, low privileges, no user interaction, and impacts confidentiality with high severity but does not affect integrity or availability. No known exploits have been reported in the wild, and patches have been identified by MediaTek (Patch ID: ALPS05917620), though no direct patch links are provided in the data. This vulnerability could be leveraged by local malicious applications or threat actors who have gained limited access to the device to extract sensitive information, potentially including multimedia data or other private user data processed by the vulnerable library.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to employees or users who utilize Android devices powered by the affected MediaTek chipsets running Android 10 or 11. Since the vulnerability allows local information disclosure without requiring user interaction or elevated privileges, compromised or malicious apps installed on corporate or personal devices could leak sensitive information. This could lead to privacy violations, leakage of corporate data, or exposure of user credentials or multimedia content. The impact is particularly relevant for sectors with high privacy requirements such as finance, healthcare, and government agencies. Additionally, organizations with Bring Your Own Device (BYOD) policies may face increased risk as personal devices with these chipsets could be exploited to gain footholds or gather intelligence. However, the vulnerability does not allow remote exploitation or direct system compromise, limiting its impact to local threat scenarios. The absence of known active exploits reduces immediate risk but does not eliminate the need for vigilance and patching. Overall, the threat could facilitate targeted local attacks or insider threats aiming to extract confidential information from affected devices within European enterprises.
Mitigation Recommendations
1. Ensure all Android devices using MediaTek chipsets are updated to the latest firmware and security patches provided by device manufacturers or carriers that include the fix for CVE-2022-20019 (Patch ID: ALPS05917620). 2. Implement strict application vetting and restrict installation of untrusted or unknown apps, especially those requesting unnecessary permissions that could exploit local vulnerabilities. 3. Employ Mobile Device Management (MDM) solutions to enforce security policies, monitor device integrity, and remotely manage patch deployment across organizational devices. 4. Educate users about the risks of installing apps from unofficial sources and encourage regular updates of their devices. 5. For sensitive environments, consider restricting or isolating devices with affected chipsets until patched, or use endpoint protection solutions capable of detecting suspicious local activity. 6. Monitor device logs and behavior for signs of local exploitation attempts or unusual information access patterns. 7. Collaborate with device vendors and carriers to obtain timely updates and verify patch deployment status across the device fleet.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2022-20019: Information Disclosure in MediaTek, Inc. MT6595, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8768
Description
In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.
AI-Powered Analysis
Technical Analysis
CVE-2022-20019 is an information disclosure vulnerability found in MediaTek's libMtkOmxGsmDec component, which is part of the multimedia framework on a wide range of MediaTek System-on-Chips (SoCs) including MT6595, MT6735, MT6737, MT6739, MT6750 series, MT676x series, MT677x series, MT678x series, MT679x series, MT68xx series, and MT8768. These SoCs are commonly integrated into Android devices running versions 10.0 and 11.0. The vulnerability arises from an incorrect bounds check in the libMtkOmxGsmDec library, which can lead to local information disclosure. Exploitation does not require additional execution privileges or user interaction, making it easier for a local attacker or malicious app with limited privileges to extract sensitive information from the device. The vulnerability is classified under CWE-20 (Improper Input Validation), indicating that the component fails to properly validate input data, leading to potential leakage of information. The CVSS v3.1 base score is 5.5 (medium severity), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires local access with low complexity, low privileges, no user interaction, and impacts confidentiality with high severity but does not affect integrity or availability. No known exploits have been reported in the wild, and patches have been identified by MediaTek (Patch ID: ALPS05917620), though no direct patch links are provided in the data. This vulnerability could be leveraged by local malicious applications or threat actors who have gained limited access to the device to extract sensitive information, potentially including multimedia data or other private user data processed by the vulnerable library.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to employees or users who utilize Android devices powered by the affected MediaTek chipsets running Android 10 or 11. Since the vulnerability allows local information disclosure without requiring user interaction or elevated privileges, compromised or malicious apps installed on corporate or personal devices could leak sensitive information. This could lead to privacy violations, leakage of corporate data, or exposure of user credentials or multimedia content. The impact is particularly relevant for sectors with high privacy requirements such as finance, healthcare, and government agencies. Additionally, organizations with Bring Your Own Device (BYOD) policies may face increased risk as personal devices with these chipsets could be exploited to gain footholds or gather intelligence. However, the vulnerability does not allow remote exploitation or direct system compromise, limiting its impact to local threat scenarios. The absence of known active exploits reduces immediate risk but does not eliminate the need for vigilance and patching. Overall, the threat could facilitate targeted local attacks or insider threats aiming to extract confidential information from affected devices within European enterprises.
Mitigation Recommendations
1. Ensure all Android devices using MediaTek chipsets are updated to the latest firmware and security patches provided by device manufacturers or carriers that include the fix for CVE-2022-20019 (Patch ID: ALPS05917620). 2. Implement strict application vetting and restrict installation of untrusted or unknown apps, especially those requesting unnecessary permissions that could exploit local vulnerabilities. 3. Employ Mobile Device Management (MDM) solutions to enforce security policies, monitor device integrity, and remotely manage patch deployment across organizational devices. 4. Educate users about the risks of installing apps from unofficial sources and encourage regular updates of their devices. 5. For sensitive environments, consider restricting or isolating devices with affected chipsets until patched, or use endpoint protection solutions capable of detecting suspicious local activity. 6. Monitor device logs and behavior for signs of local exploitation attempts or unusual information access patterns. 7. Collaborate with device vendors and carriers to obtain timely updates and verify patch deployment status across the device fleet.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2021-10-12T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f76020acd01a249264878
Added to database: 5/22/2025, 7:07:46 PM
Last enriched: 7/8/2025, 6:12:47 AM
Last updated: 8/11/2025, 8:29:32 PM
Views: 16
Related Threats
CVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-8098: CWE-276: Incorrect Default Permissions in Lenovo PC Manager
HighCVE-2025-53192: CWE-146 Improper Neutralization of Expression/Command Delimiters in Apache Software Foundation Apache Commons OGNL
HighCVE-2025-4371: CWE-347: Improper Verification of Cryptographic Signature in Lenovo 510 FHD Webcam
HighCVE-2025-32992: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.