Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-27673: NA in AMD AMD Link Android

0
High
VulnerabilityCVE-2022-27673cvecve-2022-27673
Published: Wed Nov 09 2022 (11/09/2022, 20:46:51 UTC)
Source: CVE
Vendor/Project: AMD
Product: AMD Link Android

Description

Insufficient access controls in the AMD Link Android app may potentially result in information disclosure.

AI-Powered Analysis

AILast updated: 07/02/2025, 02:28:02 UTC

Technical Analysis

CVE-2022-27673 is a high-severity vulnerability identified in the AMD Link Android application, including its TV variant. The root cause of this vulnerability is insufficient access controls within the app, which could lead to unauthorized information disclosure. Specifically, the vulnerability is categorized under CWE-284, which pertains to improper access control mechanisms. The CVSS v3.1 score of 7.5 indicates a high impact primarily on confidentiality, with no impact on integrity or availability. The attack vector is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N), making exploitation relatively straightforward. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other system components. Since the vulnerability allows attackers to access sensitive information without authentication, it poses a significant risk, especially if the disclosed information includes user credentials, session tokens, or other sensitive data that could facilitate further attacks. No known exploits are currently reported in the wild, and no patches have been linked yet, which suggests that affected users should be vigilant and monitor for updates from AMD. The vulnerability affects all versions of AMD Link Android and TV apps, which are used to connect and control AMD hardware remotely, often for monitoring system performance or streaming content. This vulnerability could be exploited by attackers on the same network or remotely if the device is exposed, potentially compromising user privacy and security.

Potential Impact

For European organizations, the impact of CVE-2022-27673 could be significant, particularly for those relying on AMD hardware and the AMD Link Android app for remote management or monitoring. The unauthorized disclosure of sensitive information could lead to privacy violations, leakage of internal system data, or exposure of credentials that attackers could leverage for lateral movement within corporate networks. This is especially critical for organizations in sectors with strict data protection regulations such as GDPR, where unauthorized data disclosure can result in severe legal and financial penalties. Additionally, enterprises using AMD Link in environments with sensitive or proprietary information could face operational risks if attackers gain insights into system configurations or user activity. Although no integrity or availability impacts are noted, the confidentiality breach alone warrants immediate attention. The fact that exploitation requires no user interaction or privileges increases the risk profile, as attackers can potentially automate attacks without alerting users. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as threat actors may develop exploits in the future.

Mitigation Recommendations

To mitigate the risks associated with CVE-2022-27673, European organizations should take several specific actions beyond generic advice: 1) Immediately audit the deployment of AMD Link Android and TV apps within their environments to identify all instances and versions in use. 2) Restrict network access to devices running AMD Link apps by implementing network segmentation and firewall rules that limit exposure to trusted networks only. 3) Monitor network traffic for unusual or unauthorized access attempts to AMD Link services, using intrusion detection systems (IDS) or endpoint detection and response (EDR) tools. 4) Enforce strict access control policies on devices running the app, including strong authentication mechanisms and device-level encryption. 5) Stay updated with AMD’s official communications and apply patches or updates as soon as they become available. 6) Consider temporarily disabling or uninstalling the AMD Link Android app on devices where remote monitoring is not critical until a patch is released. 7) Educate users and administrators about the risks of using vulnerable versions and encourage reporting of suspicious activity. These targeted steps will help reduce the attack surface and limit the potential for exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
AMD
Date Reserved
2022-03-23T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbece42

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 7/2/2025, 2:28:02 AM

Last updated: 2/7/2026, 6:51:39 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats