Skip to main content

CVE-2022-20019: Information Disclosure in MediaTek, Inc. MT6595, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8768

Medium
VulnerabilityCVE-2022-20019cvecve-2022-20019
Published: Tue Jan 04 2022 (01/04/2022, 15:56:57 UTC)
Source: CVE
Vendor/Project: MediaTek, Inc.
Product: MT6595, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8768

Description

In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.

AI-Powered Analysis

AILast updated: 07/08/2025, 06:12:47 UTC

Technical Analysis

CVE-2022-20019 is an information disclosure vulnerability found in MediaTek's libMtkOmxGsmDec component, which is part of the multimedia framework on a wide range of MediaTek System-on-Chips (SoCs) including MT6595, MT6735, MT6737, MT6739, MT6750 series, MT676x series, MT677x series, MT678x series, MT679x series, MT68xx series, and MT8768. These SoCs are commonly integrated into Android devices running versions 10.0 and 11.0. The vulnerability arises from an incorrect bounds check in the libMtkOmxGsmDec library, which can lead to local information disclosure. Exploitation does not require additional execution privileges or user interaction, making it easier for a local attacker or malicious app with limited privileges to extract sensitive information from the device. The vulnerability is classified under CWE-20 (Improper Input Validation), indicating that the component fails to properly validate input data, leading to potential leakage of information. The CVSS v3.1 base score is 5.5 (medium severity), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires local access with low complexity, low privileges, no user interaction, and impacts confidentiality with high severity but does not affect integrity or availability. No known exploits have been reported in the wild, and patches have been identified by MediaTek (Patch ID: ALPS05917620), though no direct patch links are provided in the data. This vulnerability could be leveraged by local malicious applications or threat actors who have gained limited access to the device to extract sensitive information, potentially including multimedia data or other private user data processed by the vulnerable library.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to employees or users who utilize Android devices powered by the affected MediaTek chipsets running Android 10 or 11. Since the vulnerability allows local information disclosure without requiring user interaction or elevated privileges, compromised or malicious apps installed on corporate or personal devices could leak sensitive information. This could lead to privacy violations, leakage of corporate data, or exposure of user credentials or multimedia content. The impact is particularly relevant for sectors with high privacy requirements such as finance, healthcare, and government agencies. Additionally, organizations with Bring Your Own Device (BYOD) policies may face increased risk as personal devices with these chipsets could be exploited to gain footholds or gather intelligence. However, the vulnerability does not allow remote exploitation or direct system compromise, limiting its impact to local threat scenarios. The absence of known active exploits reduces immediate risk but does not eliminate the need for vigilance and patching. Overall, the threat could facilitate targeted local attacks or insider threats aiming to extract confidential information from affected devices within European enterprises.

Mitigation Recommendations

1. Ensure all Android devices using MediaTek chipsets are updated to the latest firmware and security patches provided by device manufacturers or carriers that include the fix for CVE-2022-20019 (Patch ID: ALPS05917620). 2. Implement strict application vetting and restrict installation of untrusted or unknown apps, especially those requesting unnecessary permissions that could exploit local vulnerabilities. 3. Employ Mobile Device Management (MDM) solutions to enforce security policies, monitor device integrity, and remotely manage patch deployment across organizational devices. 4. Educate users about the risks of installing apps from unofficial sources and encourage regular updates of their devices. 5. For sensitive environments, consider restricting or isolating devices with affected chipsets until patched, or use endpoint protection solutions capable of detecting suspicious local activity. 6. Monitor device logs and behavior for signs of local exploitation attempts or unusual information access patterns. 7. Collaborate with device vendors and carriers to obtain timely updates and verify patch deployment status across the device fleet.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2021-10-12T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f76020acd01a249264878

Added to database: 5/22/2025, 7:07:46 PM

Last enriched: 7/8/2025, 6:12:47 AM

Last updated: 8/11/2025, 8:29:32 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats