Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-38669: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

0
High
VulnerabilityCVE-2022-38669cvecve-2022-38669cwe-862
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In soundrecorder service, there is a missing permission check. This could lead to elevation of privilege in contacts service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 07/06/2025, 10:56:19 UTC

Technical Analysis

CVE-2022-38669 is a high-severity vulnerability identified in several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple others used in Android devices running versions 10, 11, and 12. The vulnerability stems from a missing authorization check in the soundrecorder service, which is a system service responsible for audio recording functionalities. Due to this missing permission validation, an attacker with limited privileges can exploit this flaw to elevate their privileges within the contacts service without requiring additional execution privileges or user interaction. This elevation of privilege can lead to unauthorized access and modification of sensitive contact information, potentially compromising confidentiality, integrity, and availability of user data. The CVSS v3.1 base score of 7.8 reflects the high impact on confidentiality, integrity, and availability, combined with the low attack complexity and limited privileges required for exploitation. Although no known exploits are reported in the wild, the vulnerability presents a significant risk given the widespread use of affected Unisoc chipsets in many Android devices, especially in budget and mid-range smartphones. The lack of a patch link suggests that remediation may still be pending or distributed through OEM updates. The CWE-862 classification (Missing Authorization) highlights the root cause as improper enforcement of access control, a common and critical security flaw in system services.

Potential Impact

For European organizations, the impact of CVE-2022-38669 can be substantial, particularly for enterprises and government agencies relying on Android devices powered by Unisoc chipsets. The vulnerability allows attackers to escalate privileges within the contacts service, potentially leading to unauthorized access to sensitive contact data, which could include personal, corporate, or governmental contacts. This breach of confidentiality could facilitate further social engineering attacks, espionage, or data leakage. Integrity of contact data could also be compromised, affecting communication reliability and trustworthiness. Availability might be impacted if the attacker manipulates the service to disrupt normal operations. Given the prevalence of Android devices in European markets, especially in sectors with mobile workforce or BYOD policies, this vulnerability could expose a broad attack surface. Additionally, the lack of user interaction requirement and low complexity of exploitation increase the risk of automated or remote attacks. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation, especially as threat actors often reverse-engineer disclosed vulnerabilities. Organizations handling sensitive communications or regulated data (e.g., GDPR-protected personal data) must consider the compliance and reputational risks associated with this vulnerability.

Mitigation Recommendations

To mitigate CVE-2022-38669 effectively, European organizations should: 1) Identify and inventory all Android devices using Unisoc chipsets listed as affected, focusing on those running Android 10, 11, or 12. 2) Engage with device manufacturers and mobile service providers to obtain and deploy official security patches or firmware updates addressing this vulnerability as soon as they become available. 3) Implement mobile device management (MDM) solutions to enforce security policies, restrict installation of untrusted applications, and monitor for anomalous behavior related to the soundrecorder or contacts services. 4) Limit the exposure of sensitive contact data by enforcing strict access controls and encryption on devices and applications that handle such data. 5) Educate users about the risks of privilege escalation vulnerabilities and encourage prompt installation of updates. 6) Consider network-level protections such as anomaly detection to identify suspicious activities originating from compromised devices. 7) For high-security environments, evaluate the feasibility of restricting or isolating devices with affected chipsets until patches are applied. These steps go beyond generic advice by emphasizing device inventory, vendor coordination, and layered defense tailored to the specific chipset and Android versions involved.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-08-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec63f

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 10:56:19 AM

Last updated: 2/7/2026, 12:28:13 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats