CVE-2022-47029
📋 TL;DR
This vulnerability in Action Launcher allows attackers to escalate privileges by modifying intent strings sent to the update function. It affects users of Action Launcher v50.5 on Android devices, potentially allowing malicious apps to gain elevated permissions.
💻 Affected Systems
- Action Launcher
📦 What is this software?
Action Launcher by Actionlauncher
⚠️ Risk & Real-World Impact
Worst Case
An attacker could gain full system-level privileges, potentially compromising the entire Android device, accessing sensitive data, or installing persistent malware.
Likely Case
A malicious app could gain elevated permissions to access protected system resources, user data, or perform unauthorized actions without user consent.
If Mitigated
With proper app sandboxing and permission controls, impact would be limited to the app's own data and permissions, preventing system-wide compromise.
🎯 Exploit Status
Exploitation requires a malicious app to be installed on the target device and to craft specific intent strings.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v50.6 or later
Vendor Advisory: https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47029/CVE%20detailed.md
Restart Required: Yes
Instructions:
1. Open Google Play Store 2. Search for Action Launcher 3. Update to latest version (v50.6+) 4. Restart device after update
🔧 Temporary Workarounds
Disable Action Launcher
androidTemporarily disable or uninstall Action Launcher until patched
Settings > Apps > Action Launcher > Disable/Uninstall
Restrict app installations
androidPrevent installation of unknown apps from untrusted sources
Settings > Security > Unknown Sources > Disable
🧯 If You Can't Patch
- Uninstall Action Launcher and use alternative launcher
- Enable Google Play Protect and only install apps from official store
🔍 How to Verify
Check if Vulnerable:
Check Action Launcher version in Settings > Apps > Action Launcher > App Info
Check Version:
adb shell dumpsys package com.actionlauncher.playstore | grep versionName
Verify Fix Applied:
Verify Action Launcher version is v50.6 or higher after update
📡 Detection & Monitoring
Log Indicators:
- Unusual intent strings sent to Action Launcher update function
- Permission escalation attempts in system logs
Network Indicators:
- Not applicable - local exploit only
SIEM Query:
Not applicable for typical mobile device management