Skip to main content

CVE-2022-20199: Information disclosure in Android

Medium
Published: Fri Dec 16 2022 (12/16/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Android

Description

In multiple locations of NfcService.java, there is a possible disclosure of NFC tags due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-199291025

AI-Powered Analysis

AILast updated: 06/20/2025, 11:35:29 UTC

Technical Analysis

CVE-2022-20199 is a medium-severity information disclosure vulnerability affecting Android 13, specifically within the NfcService.java component. The vulnerability arises from a confused deputy problem in multiple locations of the NfcService code, which handles Near Field Communication (NFC) tag interactions. A confused deputy vulnerability occurs when a privileged component is tricked into misusing its authority on behalf of an unprivileged actor. In this case, the NfcService may inadvertently disclose information about NFC tags to unauthorized local applications or processes. Exploitation does not require additional execution privileges beyond those already granted to the attacker, nor does it require any user interaction, making it easier to exploit in local scenarios. The vulnerability impacts confidentiality by potentially exposing sensitive NFC tag data, but it does not affect integrity or availability of the system. The CVSS 3.1 base score is 5.5 (medium), with vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches or fixes are linked in the provided information, suggesting that mitigation may rely on updates from Android vendors or device manufacturers. The vulnerability is classified under CWE-610 (Improper Restriction of XML External Entity Reference), which in this context relates to improper handling of NFC data leading to information leakage.

Potential Impact

For European organizations, the primary impact of CVE-2022-20199 is the potential leakage of sensitive NFC tag information on devices running Android 13. This could include data stored on contactless payment cards, access control badges, or other NFC-enabled credentials used within corporate environments. The confidentiality breach could facilitate further targeted attacks, social engineering, or unauthorized access to physical or logical resources. Since exploitation requires local access and low privileges, the threat is more relevant in scenarios where attackers have physical or local access to devices, such as in shared workspaces, public areas, or through malicious apps installed on employee devices. The lack of required user interaction increases the risk of stealthy data exfiltration. However, the vulnerability does not affect system integrity or availability, so it is unlikely to cause direct operational disruptions. Organizations relying heavily on NFC technology for authentication, payments, or secure communications should consider this vulnerability significant. Additionally, sectors with high NFC usage such as finance, transportation, and government services in Europe may face increased risks of data leakage and subsequent exploitation.

Mitigation Recommendations

Ensure all Android 13 devices are updated with the latest security patches as soon as vendors release fixes addressing CVE-2022-20199. Implement strict application permission controls to limit which apps can access NFC services, reducing the attack surface for local privilege exploitation. Deploy Mobile Device Management (MDM) solutions to monitor and restrict installation of untrusted or unnecessary applications that could exploit this vulnerability. Educate employees about the risks of installing unknown apps and the importance of device physical security to prevent unauthorized local access. Where possible, disable NFC functionality on devices not requiring it for business operations to eliminate exposure. Use endpoint detection and response (EDR) tools to monitor for suspicious local activity related to NFC service access. Coordinate with device manufacturers and Android vendors to track patch availability and deployment status within the organization.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2021-10-14T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984bc4522896dcbf8205

Added to database: 5/21/2025, 9:09:31 AM

Last enriched: 6/20/2025, 11:35:29 AM

Last updated: 8/4/2025, 7:07:36 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats