CVE-2022-20220
📋 TL;DR
This vulnerability allows local attackers to bypass file permissions through a path traversal error in Android's CallLogProvider component. It enables local privilege escalation from user-level permissions to higher system access. Only Android 12 and 12L devices are affected.
💻 Affected Systems
- Android
📦 What is this software?
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to access sensitive system files, install persistent malware, or exfiltrate user data without detection.
Likely Case
Local attackers gain access to call logs and other protected content provider data they shouldn't have permission to view.
If Mitigated
With proper sandboxing and SELinux policies, impact is limited to the affected content provider's data scope.
🎯 Exploit Status
Requires local execution but no user interaction. Exploitation involves crafting specific file paths to bypass permission checks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Android Security Patch Level 2022-07-01 or later
Vendor Advisory: https://source.android.com/security/bulletin/2022-07-01
Restart Required: Yes
Instructions:
1. Check for system updates in Settings > System > System update. 2. Install Android Security Patch Level 2022-07-01 or later. 3. Reboot device after installation.
🔧 Temporary Workarounds
Disable vulnerable content providers
androidRestrict access to CallLogProvider through device policy management
adb shell pm disable-user --user 0 com.android.providers.contacts
🧯 If You Can't Patch
- Implement strict app vetting and only install apps from trusted sources
- Use mobile device management (MDM) solutions to restrict app installations
🔍 How to Verify
Check if Vulnerable:
Check Android version in Settings > About phone > Android version. If version is 12 or 12L and security patch level is before 2022-07-01, device is vulnerable.
Check Version:
adb shell getprop ro.build.version.release && adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify security patch level is 2022-07-01 or later in Settings > About phone > Android security update.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in /data/data/com.android.providers.contacts
- Permission denial logs for CallLogProvider with suspicious file paths
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
source="android_logs" AND "CallLogProvider" AND ("Permission denied" OR "openFile") AND path="*../*"