Skip to main content

CVE-2022-38688: CWE-200 Information Exposure in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Medium
VulnerabilityCVE-2022-38688cvecve-2022-38688cwe-200
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 07/06/2025, 11:41:00 UTC

Technical Analysis

CVE-2022-38688 is a medium-severity information disclosure vulnerability identified in several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are commonly used in Android devices running Android 10, 11, and 12. The vulnerability stems from a missing permission check within the telephony service component of the affected chipsets. Specifically, the telephony service fails to enforce proper access control, allowing a local attacker with limited privileges (PR:L) to access sensitive information without requiring additional execution privileges or user interaction. The vulnerability is categorized under CWE-200 (Information Exposure), indicating that confidential data can be accessed by unauthorized parties. The CVSS 3.1 base score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires local access, low attack complexity, low privileges, no user interaction, unchanged scope, and results in high confidentiality impact but no integrity or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker to extract sensitive telephony-related information, potentially including subscriber identity, call logs, or other private data stored or processed by the telephony service, which could be leveraged for further attacks or privacy violations.

Potential Impact

For European organizations, especially those deploying mobile devices or IoT products based on Unisoc chipsets running Android 10-12, this vulnerability poses a risk of sensitive information leakage. Confidentiality breaches could lead to exposure of subscriber identities, call metadata, or other telephony-related data, which may be exploited for targeted phishing, social engineering, or surveillance. Organizations handling sensitive communications, such as government agencies, telecom operators, and enterprises with mobile workforces, could face privacy compliance issues under GDPR if personal data is exposed. Although the vulnerability requires local access and low privileges, it could be exploited by malicious insiders or through compromised devices. The lack of integrity or availability impact limits the threat to data exposure rather than system disruption. However, the potential for privacy violations and subsequent reputational damage is significant. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

To mitigate CVE-2022-38688, European organizations should: 1) Identify and inventory devices using affected Unisoc chipsets running Android 10-12. 2) Monitor vendor and Unisoc communications for patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Implement strict local device access controls to prevent unauthorized users from gaining local access, including enforcing strong device authentication and limiting physical access. 4) Employ mobile device management (MDM) solutions to monitor device integrity and detect suspicious local activities. 5) Educate users about the risks of installing untrusted applications or granting unnecessary permissions that could facilitate local exploitation. 6) For high-security environments, consider deploying devices with chipsets from vendors with faster patch cycles or verified security controls. 7) Conduct regular security audits and penetration testing focusing on local privilege escalation and information disclosure vectors to identify similar weaknesses. These steps go beyond generic advice by focusing on device inventory, access control, user education, and proactive monitoring tailored to the specific chipset vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-08-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec6d8

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 11:41:00 AM

Last updated: 8/1/2025, 11:53:08 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats