CVE-2022-20126

7.3 HIGH

📋 TL;DR

This vulnerability allows a malicious app on an Android device to enable Bluetooth discovery mode without user permission, potentially exposing the device to unauthorized connections. It affects Android versions 10 through 12L. Exploitation requires user interaction to install the malicious app.

💻 Affected Systems

Products:
  • Android
Versions: Android 10, 11, 12, 12L
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected Android versions with Bluetooth capability are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could pair with the device via Bluetooth without user knowledge, potentially enabling data exfiltration, installing malware, or conducting man-in-the-middle attacks on Bluetooth communications.

🟠

Likely Case

A malicious app could enable Bluetooth discovery to make the device visible to nearby attackers, increasing attack surface for Bluetooth-based exploits.

🟢

If Mitigated

With proper app vetting and Bluetooth security controls, impact is limited to temporary Bluetooth visibility without data compromise.

🌐 Internet-Facing: LOW - Exploitation requires local app installation, not remote network access.
🏢 Internal Only: MEDIUM - Malicious apps could be installed via sideloading or compromised app stores, affecting devices within an organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a malicious app to be installed with user interaction, but the actual privilege escalation is straightforward once the app runs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Bulletin June 2022 patches

Vendor Advisory: https://source.android.com/security/bulletin/2022-06-01

Restart Required: Yes

Instructions:

1. Apply Android Security Update from June 2022 or later. 2. Check for updates in Settings > System > System update. 3. Install available updates. 4. Reboot device after installation.

🔧 Temporary Workarounds

Disable Bluetooth when not in use

android

Turn off Bluetooth to prevent any discovery mode activation

Settings > Connected devices > Connection preferences > Bluetooth > Toggle off

Restrict app installations

android

Prevent installation of apps from unknown sources

Settings > Security > Install unknown apps > Disable for all apps

🧯 If You Can't Patch

  • Disable Bluetooth completely in device settings
  • Implement mobile device management (MDM) to block suspicious apps and monitor Bluetooth state

🔍 How to Verify

Check if Vulnerable:

Check Android version in Settings > About phone > Android version. If version is 10, 11, 12, or 12L without June 2022 security patches, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android Security Patch Level is June 2022 or later in Settings > About phone > Android version > Android security update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Bluetooth discovery mode activation without user interaction in system logs
  • Apps requesting Bluetooth permissions without legitimate need

Network Indicators:

  • Unexpected Bluetooth device visibility to scanning tools

SIEM Query:

source="android_system" AND "BluetoothAdapter" AND "startDiscovery" AND NOT user_interaction=true

🔗 References

📤 Share & Export