{"uuid": "9d7708a2-1420-4bf2-a717-529454fc8358", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-20572", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12448", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-20572\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel\n\ud83d\udccf Published: 2022-12-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-18T14:55:15.950Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2022-12-01", "creation_timestamp": "2025-04-18T14:58:51.000000Z"}