
Cloud Vulnerability DB
A community-led vulnerabilities database
In connsyslogger, there is a possible symbolic link following vulnerability (CVE-2022-20050) due to improper link resolution. The vulnerability was discovered and disclosed in March 2022, affecting various MediaTek chipsets including MT6762, MT6765, MT6768, and several others running Android versions 11.0 and 12.0 (MediaTek Bulletin).
The vulnerability is classified as a Unix Symbolic Link (Symlink) Following issue (CWE-61) with a medium severity rating. The technical nature of the vulnerability involves improper link resolution in the connsyslogger component, which could be exploited when system execution privileges are available (NVD).
The vulnerability could lead to local escalation of privilege when exploited successfully. The attack requires system execution privileges but does not need user interaction for exploitation (MediaTek Bulletin).
MediaTek has addressed this vulnerability through their March 2022 security bulletin. Device OEMs were notified of the issues and corresponding security patches at least two months before publication (MediaTek Bulletin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."