{"vulnerability": "CVE-2022-20006", "sightings": [{"uuid": "d321ed99-c59d-48a4-96d1-43761db97a91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/antichat/9949", "content": "https://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a", "creation_timestamp": "2022-07-14T11:21:33.000000Z"}, {"uuid": "f3d326d7-5524-4dbe-b1a6-33c5ce4baf85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/12", "content": "https://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a", "creation_timestamp": "2022-08-02T21:13:28.000000Z"}, {"uuid": "bee777eb-c478-4c7e-a3fd-9ea221fe69cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "seen", "source": "https://t.me/arpsyndicate/1864", "content": "#ExploitObserverAlert\n\nCVE-2022-20006\n\nDESCRIPTION: Exploit Observer has 14 entries related to CVE-2022-20006. In several functions of KeyguardServiceWrapper.java and related files,, there is a possible way to briefly view what's under the lockscreen due to a race condition. This could lead to local escalation of privilege if a Guest user is enabled, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-151095871\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.0", "creation_timestamp": "2023-12-17T23:22:20.000000Z"}, {"uuid": "2d75041e-cf64-4959-b57c-5b6a16b285b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "Telegram/6aFSrxEjJBHYzo7vXi-VfQhiMjzIsqxMO-ocK-7To-fhHw", "content": "", "creation_timestamp": "2023-11-22T10:12:01.000000Z"}, {"uuid": "81617078-4661-48f7-857a-33a8077c1675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "seen", "source": "https://t.me/Ent_TranslateIB/81", "content": "#\u0421\u0442\u0430\u0442\u044c\u044f\n\n\u041f\u0435\u0440\u0435\u0432\u043e\u0434: \u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043e\u0431\u0445\u043e\u0434\u0430 \u044d\u043a\u0440\u0430\u043d\u0430 \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Android (CVE-2022-20006)", "creation_timestamp": "2022-07-02T08:16:09.000000Z"}, {"uuid": "ed0d4275-66f0-4e7f-a027-94be97d135a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/196", "content": "Lock Screen Bypass Exploit of Android Devices (CVE-2022\u201320006)\nhttps://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a", "creation_timestamp": "2022-07-16T09:18:38.000000Z"}, {"uuid": "2f761f82-c38b-483c-89d7-a2d2949181f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "seen", "source": "https://t.me/cibsecurity/42271", "content": "\u203c CVE-2022-20006 \u203c\n\nIn several functions of KeyguardServiceWrapper.java and related files,, there is a possible way to briefly view what's under the lockscreen due to a race condition. This could lead to local escalation of privilege if a Guest user is enabled, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-151095871\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T00:32:56.000000Z"}, {"uuid": "b2a3eb7a-9728-4816-bea0-0e72316d8c2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1593", "content": "Lock Screen Bypass Exploit of Android Devices (CVE-2022\u201320006)\nhttps://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a", "creation_timestamp": "2022-07-13T09:16:54.000000Z"}, {"uuid": "85757e62-d3bb-4621-8794-85916fb52756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/6368", "content": "Lock Screen Bypass Exploit of Android Devices (CVE-2022\u201320006)\nhttps://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a", "creation_timestamp": "2022-07-13T21:13:52.000000Z"}, {"uuid": "44af1f67-dbb6-4715-85d2-f5f5b126239b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6653", "content": "#exploit\n1. CVE-2022-20006:\nLock Screen Bypass Exploit of Android Devices\nhttps://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a\n\n2. The Journey of Hunting In-the-Wild Windows LPE 0day\nhttps://www.blackhat.com/us-22/briefings/schedule/#the-journey-of-hunting-in-the-wild-windows-lpe-day-26988\n\n3. CVE-2022-33318:\nParacosme - RCE in ICONICS Genesis64\nhttps://github.com/0vercl0k/paracosme", "creation_timestamp": "2022-08-23T15:18:01.000000Z"}]}