CVE-2022-22264

7.7 HIGH

📋 TL;DR

This vulnerability in Samsung's Dressroom app allows local attackers to read and write arbitrary files without proper permissions due to improper intent sanitization. It affects Samsung devices running vulnerable versions of the Dressroom app prior to the January 2022 security update. Attackers must have local access to the device to exploit this flaw.

💻 Affected Systems

Products:
  • Samsung Dressroom app
Versions: All versions prior to SMR Jan-2022 Release 1
Operating Systems: Android (Samsung devices)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Samsung devices with the Dressroom app installed. The app may be pre-installed on some Samsung devices.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of device data including sensitive files, credentials, and system files, potentially leading to full device takeover or data exfiltration.

🟠

Likely Case

Unauthorized access to user data, modification of app files, or privilege escalation within the affected application context.

🟢

If Mitigated

Limited impact with proper app sandboxing and file permission controls in place, though some data exposure may still occur.

🌐 Internet-Facing: LOW - Requires local access to device, not directly exploitable over network.
🏢 Internal Only: HIGH - Local attackers with physical or remote access to device can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the device and knowledge of the vulnerability. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SMR Jan-2022 Release 1

Vendor Advisory: https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1

Restart Required: Yes

Instructions:

1. Go to Settings > Software update on your Samsung device. 2. Check for and install the January 2022 security update. 3. Restart your device after installation completes. 4. Verify the update was successful by checking the security patch level in Settings > About phone.

🔧 Temporary Workarounds

Disable or remove Dressroom app

android

Temporarily disable or uninstall the Dressroom app until the security update can be applied.

adb shell pm disable-user --user 0 com.samsung.android.dressroom
adb uninstall com.samsung.android.dressroom

🧯 If You Can't Patch

  • Restrict physical access to devices and implement strong device access controls
  • Monitor for unusual file access patterns or privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if the security patch level is earlier than January 2022 in Settings > About phone > Software information.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify the security patch level shows 'January 1, 2022' or later in Settings > About phone > Software information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from Dressroom app
  • Permission violations in system logs
  • Intent-related errors or warnings

Network Indicators:

  • Unusual outbound data transfers from device
  • Suspicious local network activity

SIEM Query:

source="android_system" AND (app="com.samsung.android.dressroom" AND (event="file_access" OR event="permission_violation"))

🔗 References

📤 Share & Export