ID

VAR-202201-1692


CVE

CVE-2022-22268


TITLE

Android  Vulnerability in externally accessible files or directories in

Trust: 0.8

sources: JVNDB: JVNDB-2022-002956

DESCRIPTION

Incorrect implementation of Knox Guard prior to SMR Jan-2022 Release 1 allows physically proximate attackers to temporary unlock the Knox Guard via Samsung DeX mode. Android Exists in a vulnerability in externally accessible files or directories.Information may be obtained and information may be tampered with. Samsung Knox Guard is a security solution based on the open source Android platform from Samsung, South Korea. It can comprehensively enhance security through a combination of physical means and software systems. It is perfectly compatible with the Android and Google ecosystems, bringing industry-leading enterprise mobile security solutions to enterprises and individual employees

Trust: 2.25

sources: NVD: CVE-2022-22268 // JVNDB: JVNDB-2022-002956 // CNVD: CNVD-2025-02619 // VULMON: CVE-2022-22268

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-02619

AFFECTED PRODUCTS

vendor:googlemodel:androidscope:eqversion:12.0

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:11.0

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:10.0

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:9.0

Trust: 1.0

vendor:googlemodel:androidscope:eqversion: -

Trust: 0.8

vendor:googlemodel:androidscope: - version: -

Trust: 0.8

vendor:samsungmodel:mobile devices pscope: - version: -

Trust: 0.6

vendor:samsungmodel:mobile devices qscope: - version: -

Trust: 0.6

vendor:samsungmodel:mobile devices rscope: - version: -

Trust: 0.6

vendor:samsungmodel:mobile devices sscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-02619 // JVNDB: JVNDB-2022-002956 // NVD: CVE-2022-22268

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-22268
value: MEDIUM

Trust: 1.0

mobile.security@samsung.com: CVE-2022-22268
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-22268
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-02619
value: LOW

Trust: 0.6

CNNVD: CNNVD-202201-617
value: MEDIUM

Trust: 0.6

VULMON: CVE-2022-22268
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2022-22268
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2025-02619
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-22268
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 0.9
impactScore: 5.2
version: 3.1

Trust: 2.0

OTHER: JVNDB-2022-002956
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-02619 // VULMON: CVE-2022-22268 // JVNDB: JVNDB-2022-002956 // CNNVD: CNNVD-202201-617 // NVD: CVE-2022-22268 // NVD: CVE-2022-22268

PROBLEMTYPE DATA

problemtype:CWE-552

Trust: 1.0

problemtype:CWE-285

Trust: 1.0

problemtype:Externally accessible file or directory (CWE-552) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-002956 // NVD: CVE-2022-22268

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202201-617

PATCH

title:top pageurl:https://www.android.com/

Trust: 0.8

title:Patch for Samsung Knox Guard Execution Error Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/355556

Trust: 0.6

title:Samsung SMR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=178084

Trust: 0.6

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-RCE

Trust: 0.1

sources: CNVD: CNVD-2025-02619 // VULMON: CVE-2022-22268 // JVNDB: JVNDB-2022-002956 // CNNVD: CNNVD-202201-617

EXTERNAL IDS

db:NVDid:CVE-2022-22268

Trust: 3.9

db:JVNDBid:JVNDB-2022-002956

Trust: 0.8

db:CNVDid:CNVD-2025-02619

Trust: 0.6

db:CNNVDid:CNNVD-202201-617

Trust: 0.6

db:VULMONid:CVE-2022-22268

Trust: 0.1

sources: CNVD: CNVD-2025-02619 // VULMON: CVE-2022-22268 // JVNDB: JVNDB-2022-002956 // CNNVD: CNNVD-202201-617 // NVD: CVE-2022-22268

REFERENCES

url:https://security.samsungmobile.com/securityupdate.smsb?year=2022&month=1

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-22268

Trust: 2.0

url:https://cwe.mitre.org/data/definitions/552.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

sources: CNVD: CNVD-2025-02619 // VULMON: CVE-2022-22268 // JVNDB: JVNDB-2022-002956 // CNNVD: CNNVD-202201-617 // NVD: CVE-2022-22268

SOURCES

db:CNVDid:CNVD-2025-02619
db:VULMONid:CVE-2022-22268
db:JVNDBid:JVNDB-2022-002956
db:CNNVDid:CNNVD-202201-617
db:NVDid:CVE-2022-22268

LAST UPDATE DATE

2025-02-13T23:29:12.068000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-02619date:2025-02-11T00:00:00
db:VULMONid:CVE-2022-22268date:2022-01-14T00:00:00
db:JVNDBid:JVNDB-2022-002956date:2023-01-31T05:25:00
db:CNNVDid:CNNVD-202201-617date:2022-03-10T00:00:00
db:NVDid:CVE-2022-22268date:2024-11-21T06:46:31.520

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-02619date:2025-02-10T00:00:00
db:VULMONid:CVE-2022-22268date:2022-01-10T00:00:00
db:JVNDBid:JVNDB-2022-002956date:2023-01-31T00:00:00
db:CNNVDid:CNNVD-202201-617date:2022-01-10T00:00:00
db:NVDid:CVE-2022-22268date:2022-01-10T14:12:39.467