Skip to main content

CVE-2022-27673: NA in AMD AMD Link Android

High
VulnerabilityCVE-2022-27673cvecve-2022-27673
Published: Wed Nov 09 2022 (11/09/2022, 20:46:51 UTC)
Source: CVE
Vendor/Project: AMD
Product: AMD Link Android

Description

Insufficient access controls in the AMD Link Android app may potentially result in information disclosure.

AI-Powered Analysis

AILast updated: 07/02/2025, 02:28:02 UTC

Technical Analysis

CVE-2022-27673 is a high-severity vulnerability identified in the AMD Link Android application, including its TV variant. The root cause of this vulnerability is insufficient access controls within the app, which could lead to unauthorized information disclosure. Specifically, the vulnerability is categorized under CWE-284, which pertains to improper access control mechanisms. The CVSS v3.1 score of 7.5 indicates a high impact primarily on confidentiality, with no impact on integrity or availability. The attack vector is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N), making exploitation relatively straightforward. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other system components. Since the vulnerability allows attackers to access sensitive information without authentication, it poses a significant risk, especially if the disclosed information includes user credentials, session tokens, or other sensitive data that could facilitate further attacks. No known exploits are currently reported in the wild, and no patches have been linked yet, which suggests that affected users should be vigilant and monitor for updates from AMD. The vulnerability affects all versions of AMD Link Android and TV apps, which are used to connect and control AMD hardware remotely, often for monitoring system performance or streaming content. This vulnerability could be exploited by attackers on the same network or remotely if the device is exposed, potentially compromising user privacy and security.

Potential Impact

For European organizations, the impact of CVE-2022-27673 could be significant, particularly for those relying on AMD hardware and the AMD Link Android app for remote management or monitoring. The unauthorized disclosure of sensitive information could lead to privacy violations, leakage of internal system data, or exposure of credentials that attackers could leverage for lateral movement within corporate networks. This is especially critical for organizations in sectors with strict data protection regulations such as GDPR, where unauthorized data disclosure can result in severe legal and financial penalties. Additionally, enterprises using AMD Link in environments with sensitive or proprietary information could face operational risks if attackers gain insights into system configurations or user activity. Although no integrity or availability impacts are noted, the confidentiality breach alone warrants immediate attention. The fact that exploitation requires no user interaction or privileges increases the risk profile, as attackers can potentially automate attacks without alerting users. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as threat actors may develop exploits in the future.

Mitigation Recommendations

To mitigate the risks associated with CVE-2022-27673, European organizations should take several specific actions beyond generic advice: 1) Immediately audit the deployment of AMD Link Android and TV apps within their environments to identify all instances and versions in use. 2) Restrict network access to devices running AMD Link apps by implementing network segmentation and firewall rules that limit exposure to trusted networks only. 3) Monitor network traffic for unusual or unauthorized access attempts to AMD Link services, using intrusion detection systems (IDS) or endpoint detection and response (EDR) tools. 4) Enforce strict access control policies on devices running the app, including strong authentication mechanisms and device-level encryption. 5) Stay updated with AMD’s official communications and apply patches or updates as soon as they become available. 6) Consider temporarily disabling or uninstalling the AMD Link Android app on devices where remote monitoring is not critical until a patch is released. 7) Educate users and administrators about the risks of using vulnerable versions and encourage reporting of suspicious activity. These targeted steps will help reduce the attack surface and limit the potential for exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMD
Date Reserved
2022-03-23T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbece42

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 7/2/2025, 2:28:02 AM

Last updated: 7/30/2025, 4:30:10 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats