Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-20445: Information disclosure in Android

0
High
VulnerabilityCVE-2022-20445cvecve-2022-20445
Published: Tue Nov 08 2022 (11/08/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Android

Description

In process_service_search_rsp of sdp_discovery.cc, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-225876506

AI-Powered Analysis

AILast updated: 07/02/2025, 01:09:59 UTC

Technical Analysis

CVE-2022-20445 is a high-severity information disclosure vulnerability affecting multiple versions of the Android operating system, specifically Android 10 through Android 13, including Android 12L. The vulnerability arises from an out-of-bounds read in the function process_service_search_rsp within the sdp_discovery.cc source file. This function is part of the Bluetooth Service Discovery Protocol (SDP) implementation. The root cause is improper input validation, which allows an attacker to craft malicious SDP responses that trigger the out-of-bounds read. Exploitation does not require any privileges or user interaction, meaning an unauthenticated remote attacker can potentially exploit this vulnerability simply by sending specially crafted Bluetooth packets to a vulnerable device. The impact is limited to information disclosure, with no direct impact on integrity or availability. However, the confidentiality breach could expose sensitive data stored or processed on the device. The CVSS v3.1 base score is 7.5, reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed, with a high impact on confidentiality but no impact on integrity or availability. No known exploits in the wild have been reported to date, and no official patches are linked in the provided data, though it is expected that Google and device manufacturers have addressed this in security updates following the vulnerability disclosure. The CWE classification is CWE-1284, indicating an out-of-bounds read vulnerability. Given the widespread use of affected Android versions globally, this vulnerability represents a significant risk, especially in environments where Bluetooth is enabled and devices are exposed to potentially malicious actors in proximity.

Potential Impact

For European organizations, the primary impact of CVE-2022-20445 is the potential unauthorized disclosure of sensitive information from Android devices used within corporate environments. Many European enterprises rely heavily on Android smartphones and tablets for business operations, including access to corporate email, documents, and internal applications. An attacker exploiting this vulnerability could gain access to confidential data transmitted or stored on these devices without requiring user interaction or elevated privileges. This could lead to data breaches, loss of intellectual property, or exposure of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Additionally, sectors with high Bluetooth usage such as manufacturing, healthcare, and logistics could face increased risk due to the reliance on Bluetooth-enabled devices for operational technology and communication. The vulnerability could also be leveraged in targeted attacks against high-value individuals or organizations by adversaries capable of proximity-based exploitation. Although no known exploits are reported, the ease of exploitation and the lack of required user interaction make this a credible threat vector that European organizations must address proactively.

Mitigation Recommendations

To mitigate the risk posed by CVE-2022-20445, European organizations should implement the following specific measures: 1) Ensure all Android devices are updated to the latest security patches provided by device manufacturers or Google, as these updates likely contain fixes for this vulnerability. 2) Enforce strict Bluetooth usage policies, including disabling Bluetooth on devices when not in use, especially in sensitive or high-risk environments. 3) Deploy mobile device management (MDM) solutions that can centrally manage device configurations, enforce security policies, and monitor Bluetooth activity for anomalies. 4) Educate users about the risks of Bluetooth exposure and encourage them to avoid pairing with unknown or untrusted devices. 5) For critical environments, consider network segmentation and physical security controls to limit attacker proximity to devices. 6) Monitor security advisories and threat intelligence feeds for any emerging exploits or indicators of compromise related to this vulnerability. 7) Conduct regular security assessments and penetration testing focusing on Bluetooth attack surfaces to identify and remediate potential weaknesses. These targeted actions go beyond generic advice by focusing on Bluetooth-specific controls and organizational policy enforcement tailored to the nature of the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2021-10-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec480

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 7/2/2025, 1:09:59 AM

Last updated: 2/7/2026, 4:52:59 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats