cve/2022/CVE-2022-20040.md

19 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-20040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20040)
![](https://img.shields.io/static/v1?label=Product&message=MT6735%2C%20MT6737%2C%20MT6739%2C%20MT6755%2C%20MT6757%2C%20MT6761%2C%20MT6771%2C%20MT6779%2C%20MT6785%2C%20MT6833%2C%20MT6853%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8167%2C%20MT8168%2C%20MT8173%2C%20MT8175%2C%20MT8185%2C%20MT8321%2C%20MT8362A%2C%20MT8365%2C%20MT8385%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8797&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen)
### Description
In power_hal_manager_service, there is a possible permission bypass due to a stack-based buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219150; Issue ID: ALPS06219150.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/pokerfacett/MY_CVE_CREDIT