Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-2390 : What You Need to Know

Learn about CVE-2022-2390, a vulnerability in Google Play Services SDK impacting apps with mutable pending intents. Discover its impact, affected versions, and mitigation steps.

A detailed overview of CVE-2022-2390, a vulnerability related to mutable pending intent in Google Play services SDK.

Understanding CVE-2022-2390

This section explores the nature and impact of the vulnerability in Google Play services SDK.

What is CVE-2022-2390?

Apps developed with the Google Play Services SDK incorrectly set the mutability flag to PendingIntents passed to the Notification service. This bug, affecting numerous applications, allows attackers to gain access to non-exported providers and potentially other providers with victim permissions.

The Impact of CVE-2022-2390

The vulnerability scored a base severity of MEDIUM with a CVSS base score of 6.1. It has a high confidentiality impact and low integrity impact, requiring low privileges and user interaction for exploitation.

Technical Details of CVE-2022-2390

This section delves into the specifics of the vulnerability in terms of description, affected systems, versions, and exploitation mechanism.

Vulnerability Description

Apps using the Google Play Services SDK with mutable pending intents are at risk of allowing unauthorized access to providers.

Affected Systems and Versions

The issue impacts apps utilizing the Play Services SDK with versions earlier than 18.0.2.

Exploitation Mechanism

Attackers can exploit this vulnerability locally, requiring user interaction but no additional privileges to access sensitive data.

Mitigation and Prevention

This section provides guidance on how to address and mitigate the CVE-2022-2390 vulnerability.

Immediate Steps to Take

Users are advised to upgrade to version 18.0.2 of the Play Service SDK, rebuild affected apps, and redeploy them to prevent exploitation.

Long-Term Security Practices

Developers are encouraged to follow security best practices, such as setting strict permission policies and regularly updating SDKs to avoid similar vulnerabilities.

Patching and Updates

Vendor Google LLC recommends timely patching of affected systems and keeping software up to date to stay protected.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now