CVE-2022-27500: information disclosure in Intel(R) Support Android application
Incorrect default permissions for the Intel(R) Support Android application before 21.07.40 may allow an authenticated user to potentially enable information disclosure via local access.
AI Analysis
Technical Summary
CVE-2022-27500 is a medium-severity vulnerability affecting the Intel(R) Support Android application versions prior to 21.07.40. The root cause of this vulnerability lies in incorrect default permissions configured within the application, which can be exploited by an authenticated local user. Specifically, the vulnerability allows an authenticated user with local access to the device to potentially enable information disclosure. The CVSS 3.1 base score is 5.5, reflecting a scenario where the attacker requires local access (AV:L), low attack complexity (AC:L), and privileges (PR:L), but no user interaction (UI:N). The impact is limited to confidentiality (C:H), with no impact on integrity or availability. The vulnerability is categorized under CWE-276, which relates to incorrect default permissions, indicating that the application exposes sensitive information due to misconfigured access controls. There are no known exploits in the wild, and no patches are explicitly linked in the provided information, though presumably, versions from 21.07.40 onward have addressed the issue. The vulnerability affects only authenticated users with local device access, meaning remote exploitation is not feasible without prior compromise or physical access. This limits the attack surface but still poses a risk in environments where multiple users share devices or where an attacker gains local access through other means.
Potential Impact
For European organizations, the impact of CVE-2022-27500 depends largely on the deployment and usage of the Intel(R) Support Android application within their environments. Since the vulnerability requires local authenticated access, it is primarily a concern in scenarios where devices are shared among multiple users or where attackers can gain physical or local access to devices. Confidentiality is at risk, meaning sensitive information accessible through the Intel Support app could be disclosed. This could include diagnostic data, support logs, or other sensitive device information that might aid further attacks or data leakage. In sectors such as manufacturing, engineering, or IT services where Intel-based Android devices might be used for support or diagnostics, this vulnerability could expose sensitive operational data. Additionally, organizations with bring-your-own-device (BYOD) policies or less stringent device access controls may face higher risks. However, the lack of impact on integrity and availability reduces the likelihood of operational disruption or data manipulation. The medium severity suggests that while the vulnerability should be addressed, it is not an immediate critical threat unless combined with other vulnerabilities or attack vectors.
Mitigation Recommendations
To mitigate CVE-2022-27500 effectively, European organizations should: 1) Ensure that all Intel(R) Support Android applications are updated to version 21.07.40 or later, where the incorrect default permissions have been corrected. 2) Implement strict device access controls to prevent unauthorized local access, including strong authentication mechanisms and device encryption. 3) Limit the number of users with authenticated access to devices running the Intel Support app, especially in shared device environments. 4) Conduct regular audits of application permissions and configurations on Android devices to detect and remediate misconfigurations proactively. 5) Educate users about the risks of local access vulnerabilities and enforce policies that prevent installation of unauthorized applications or modifications that could escalate privileges. 6) Monitor device logs and behavior for unusual access patterns that could indicate exploitation attempts. 7) If possible, restrict or disable the Intel Support Android application on devices where it is not essential, reducing the attack surface. These steps go beyond generic advice by focusing on controlling local access, updating specific application versions, and auditing permissions regularly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2022-27500: information disclosure in Intel(R) Support Android application
Description
Incorrect default permissions for the Intel(R) Support Android application before 21.07.40 may allow an authenticated user to potentially enable information disclosure via local access.
AI-Powered Analysis
Technical Analysis
CVE-2022-27500 is a medium-severity vulnerability affecting the Intel(R) Support Android application versions prior to 21.07.40. The root cause of this vulnerability lies in incorrect default permissions configured within the application, which can be exploited by an authenticated local user. Specifically, the vulnerability allows an authenticated user with local access to the device to potentially enable information disclosure. The CVSS 3.1 base score is 5.5, reflecting a scenario where the attacker requires local access (AV:L), low attack complexity (AC:L), and privileges (PR:L), but no user interaction (UI:N). The impact is limited to confidentiality (C:H), with no impact on integrity or availability. The vulnerability is categorized under CWE-276, which relates to incorrect default permissions, indicating that the application exposes sensitive information due to misconfigured access controls. There are no known exploits in the wild, and no patches are explicitly linked in the provided information, though presumably, versions from 21.07.40 onward have addressed the issue. The vulnerability affects only authenticated users with local device access, meaning remote exploitation is not feasible without prior compromise or physical access. This limits the attack surface but still poses a risk in environments where multiple users share devices or where an attacker gains local access through other means.
Potential Impact
For European organizations, the impact of CVE-2022-27500 depends largely on the deployment and usage of the Intel(R) Support Android application within their environments. Since the vulnerability requires local authenticated access, it is primarily a concern in scenarios where devices are shared among multiple users or where attackers can gain physical or local access to devices. Confidentiality is at risk, meaning sensitive information accessible through the Intel Support app could be disclosed. This could include diagnostic data, support logs, or other sensitive device information that might aid further attacks or data leakage. In sectors such as manufacturing, engineering, or IT services where Intel-based Android devices might be used for support or diagnostics, this vulnerability could expose sensitive operational data. Additionally, organizations with bring-your-own-device (BYOD) policies or less stringent device access controls may face higher risks. However, the lack of impact on integrity and availability reduces the likelihood of operational disruption or data manipulation. The medium severity suggests that while the vulnerability should be addressed, it is not an immediate critical threat unless combined with other vulnerabilities or attack vectors.
Mitigation Recommendations
To mitigate CVE-2022-27500 effectively, European organizations should: 1) Ensure that all Intel(R) Support Android applications are updated to version 21.07.40 or later, where the incorrect default permissions have been corrected. 2) Implement strict device access controls to prevent unauthorized local access, including strong authentication mechanisms and device encryption. 3) Limit the number of users with authenticated access to devices running the Intel Support app, especially in shared device environments. 4) Conduct regular audits of application permissions and configurations on Android devices to detect and remediate misconfigurations proactively. 5) Educate users about the risks of local access vulnerabilities and enforce policies that prevent installation of unauthorized applications or modifications that could escalate privileges. 6) Monitor device logs and behavior for unusual access patterns that could indicate exploitation attempts. 7) If possible, restrict or disable the Intel Support Android application on devices where it is not essential, reducing the attack surface. These steps go beyond generic advice by focusing on controlling local access, updating specific application versions, and auditing permissions regularly.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2022-03-21T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdc14c
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 11:42:53 PM
Last updated: 2/7/2026, 9:04:25 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.