Skip to main content

CVE-2022-27500: information disclosure in Intel(R) Support Android application

Medium
VulnerabilityCVE-2022-27500cvecve-2022-27500
Published: Thu Aug 18 2022 (08/18/2022, 19:52:28 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) Support Android application

Description

Incorrect default permissions for the Intel(R) Support Android application before 21.07.40 may allow an authenticated user to potentially enable information disclosure via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 23:42:53 UTC

Technical Analysis

CVE-2022-27500 is a medium-severity vulnerability affecting the Intel(R) Support Android application versions prior to 21.07.40. The root cause of this vulnerability lies in incorrect default permissions configured within the application, which can be exploited by an authenticated local user. Specifically, the vulnerability allows an authenticated user with local access to the device to potentially enable information disclosure. The CVSS 3.1 base score is 5.5, reflecting a scenario where the attacker requires local access (AV:L), low attack complexity (AC:L), and privileges (PR:L), but no user interaction (UI:N). The impact is limited to confidentiality (C:H), with no impact on integrity or availability. The vulnerability is categorized under CWE-276, which relates to incorrect default permissions, indicating that the application exposes sensitive information due to misconfigured access controls. There are no known exploits in the wild, and no patches are explicitly linked in the provided information, though presumably, versions from 21.07.40 onward have addressed the issue. The vulnerability affects only authenticated users with local device access, meaning remote exploitation is not feasible without prior compromise or physical access. This limits the attack surface but still poses a risk in environments where multiple users share devices or where an attacker gains local access through other means.

Potential Impact

For European organizations, the impact of CVE-2022-27500 depends largely on the deployment and usage of the Intel(R) Support Android application within their environments. Since the vulnerability requires local authenticated access, it is primarily a concern in scenarios where devices are shared among multiple users or where attackers can gain physical or local access to devices. Confidentiality is at risk, meaning sensitive information accessible through the Intel Support app could be disclosed. This could include diagnostic data, support logs, or other sensitive device information that might aid further attacks or data leakage. In sectors such as manufacturing, engineering, or IT services where Intel-based Android devices might be used for support or diagnostics, this vulnerability could expose sensitive operational data. Additionally, organizations with bring-your-own-device (BYOD) policies or less stringent device access controls may face higher risks. However, the lack of impact on integrity and availability reduces the likelihood of operational disruption or data manipulation. The medium severity suggests that while the vulnerability should be addressed, it is not an immediate critical threat unless combined with other vulnerabilities or attack vectors.

Mitigation Recommendations

To mitigate CVE-2022-27500 effectively, European organizations should: 1) Ensure that all Intel(R) Support Android applications are updated to version 21.07.40 or later, where the incorrect default permissions have been corrected. 2) Implement strict device access controls to prevent unauthorized local access, including strong authentication mechanisms and device encryption. 3) Limit the number of users with authenticated access to devices running the Intel Support app, especially in shared device environments. 4) Conduct regular audits of application permissions and configurations on Android devices to detect and remediate misconfigurations proactively. 5) Educate users about the risks of local access vulnerabilities and enforce policies that prevent installation of unauthorized applications or modifications that could escalate privileges. 6) Monitor device logs and behavior for unusual access patterns that could indicate exploitation attempts. 7) If possible, restrict or disable the Intel Support Android application on devices where it is not essential, reducing the attack surface. These steps go beyond generic advice by focusing on controlling local access, updating specific application versions, and auditing permissions regularly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2022-03-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdc14c

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 11:42:53 PM

Last updated: 8/9/2025, 7:57:18 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats