CVE-2022-38688: CWE-200 Information Exposure in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
AI Analysis
Technical Summary
CVE-2022-38688 is a medium-severity information disclosure vulnerability identified in several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are commonly used in Android devices running Android 10, 11, and 12. The vulnerability stems from a missing permission check within the telephony service component of the affected chipsets. Specifically, the telephony service fails to enforce proper access control, allowing a local attacker with limited privileges (PR:L) to access sensitive information without requiring additional execution privileges or user interaction. The vulnerability is categorized under CWE-200 (Information Exposure), indicating that confidential data can be accessed by unauthorized parties. The CVSS 3.1 base score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires local access, low attack complexity, low privileges, no user interaction, unchanged scope, and results in high confidentiality impact but no integrity or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker to extract sensitive telephony-related information, potentially including subscriber identity, call logs, or other private data stored or processed by the telephony service, which could be leveraged for further attacks or privacy violations.
Potential Impact
For European organizations, especially those deploying mobile devices or IoT products based on Unisoc chipsets running Android 10-12, this vulnerability poses a risk of sensitive information leakage. Confidentiality breaches could lead to exposure of subscriber identities, call metadata, or other telephony-related data, which may be exploited for targeted phishing, social engineering, or surveillance. Organizations handling sensitive communications, such as government agencies, telecom operators, and enterprises with mobile workforces, could face privacy compliance issues under GDPR if personal data is exposed. Although the vulnerability requires local access and low privileges, it could be exploited by malicious insiders or through compromised devices. The lack of integrity or availability impact limits the threat to data exposure rather than system disruption. However, the potential for privacy violations and subsequent reputational damage is significant. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
To mitigate CVE-2022-38688, European organizations should: 1) Identify and inventory devices using affected Unisoc chipsets running Android 10-12. 2) Monitor vendor and Unisoc communications for patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Implement strict local device access controls to prevent unauthorized users from gaining local access, including enforcing strong device authentication and limiting physical access. 4) Employ mobile device management (MDM) solutions to monitor device integrity and detect suspicious local activities. 5) Educate users about the risks of installing untrusted applications or granting unnecessary permissions that could facilitate local exploitation. 6) For high-security environments, consider deploying devices with chipsets from vendors with faster patch cycles or verified security controls. 7) Conduct regular security audits and penetration testing focusing on local privilege escalation and information disclosure vectors to identify similar weaknesses. These steps go beyond generic advice by focusing on device inventory, access control, user education, and proactive monitoring tailored to the specific chipset vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2022-38688: CWE-200 Information Exposure in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
Description
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
AI-Powered Analysis
Technical Analysis
CVE-2022-38688 is a medium-severity information disclosure vulnerability identified in several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are commonly used in Android devices running Android 10, 11, and 12. The vulnerability stems from a missing permission check within the telephony service component of the affected chipsets. Specifically, the telephony service fails to enforce proper access control, allowing a local attacker with limited privileges (PR:L) to access sensitive information without requiring additional execution privileges or user interaction. The vulnerability is categorized under CWE-200 (Information Exposure), indicating that confidential data can be accessed by unauthorized parties. The CVSS 3.1 base score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires local access, low attack complexity, low privileges, no user interaction, unchanged scope, and results in high confidentiality impact but no integrity or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker to extract sensitive telephony-related information, potentially including subscriber identity, call logs, or other private data stored or processed by the telephony service, which could be leveraged for further attacks or privacy violations.
Potential Impact
For European organizations, especially those deploying mobile devices or IoT products based on Unisoc chipsets running Android 10-12, this vulnerability poses a risk of sensitive information leakage. Confidentiality breaches could lead to exposure of subscriber identities, call metadata, or other telephony-related data, which may be exploited for targeted phishing, social engineering, or surveillance. Organizations handling sensitive communications, such as government agencies, telecom operators, and enterprises with mobile workforces, could face privacy compliance issues under GDPR if personal data is exposed. Although the vulnerability requires local access and low privileges, it could be exploited by malicious insiders or through compromised devices. The lack of integrity or availability impact limits the threat to data exposure rather than system disruption. However, the potential for privacy violations and subsequent reputational damage is significant. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
To mitigate CVE-2022-38688, European organizations should: 1) Identify and inventory devices using affected Unisoc chipsets running Android 10-12. 2) Monitor vendor and Unisoc communications for patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Implement strict local device access controls to prevent unauthorized users from gaining local access, including enforcing strong device authentication and limiting physical access. 4) Employ mobile device management (MDM) solutions to monitor device integrity and detect suspicious local activities. 5) Educate users about the risks of installing untrusted applications or granting unnecessary permissions that could facilitate local exploitation. 6) For high-security environments, consider deploying devices with chipsets from vendors with faster patch cycles or verified security controls. 7) Conduct regular security audits and penetration testing focusing on local privilege escalation and information disclosure vectors to identify similar weaknesses. These steps go beyond generic advice by focusing on device inventory, access control, user education, and proactive monitoring tailored to the specific chipset vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-08-22T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec6d8
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 11:41:00 AM
Last updated: 8/1/2025, 11:53:08 AM
Views: 12
Related Threats
CVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57702: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.