CVE-2022-38689: CWE-200 Information Exposure in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
AI Analysis
Technical Summary
CVE-2022-38689 is a medium-severity vulnerability identified in telephony services of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are integrated into devices running Android versions 10, 11, and 12. The vulnerability arises due to a missing permission check within the telephony service, which allows a local attacker with limited privileges (low attack complexity and requiring low privileges) to access sensitive information without needing additional execution privileges or user interaction. This flaw is categorized under CWE-200 (Information Exposure), meaning that confidential data can be disclosed to unauthorized entities. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with a vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could allow an attacker to obtain sensitive telephony-related information, potentially including device identifiers, network details, or other private data handled by the telephony service, which could be leveraged for further targeted attacks or privacy violations.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the prevalence of devices using the affected Unisoc chipsets within their operational environment. Unisoc chipsets are commonly found in budget and mid-range smartphones, which may be used by employees or customers. The information disclosure could lead to privacy breaches, exposure of sensitive telephony data, and potential reconnaissance for more advanced attacks such as targeted phishing or device tracking. While the vulnerability does not allow direct code execution or system compromise, the confidentiality breach could undermine trust and compliance with data protection regulations such as GDPR. Organizations relying on mobile devices with these chipsets for critical communications or sensitive data handling could face increased risk of information leakage. Additionally, sectors with high privacy requirements, such as finance, healthcare, and government, may be more sensitive to such exposures. The lack of user interaction and low complexity of exploitation mean that a malicious insider or a compromised local app could exploit this vulnerability relatively easily.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify devices using the affected Unisoc chipsets running Android 10, 11, or 12 within their environment. Since no official patches are currently linked, organizations should monitor vendor and security advisories for updates from Unisoc or device manufacturers. In the interim, restricting installation of untrusted or unnecessary local applications can reduce the risk of exploitation, as the vulnerability requires local access with some privileges. Employing mobile device management (MDM) solutions to enforce strict app permissions and control over telephony-related permissions can help limit exposure. Network segmentation and monitoring for unusual telephony service access patterns may also aid in early detection of exploitation attempts. Encouraging users to update devices promptly when patches become available and considering device replacement for unsupported or unpatchable hardware are longer-term strategies. Additionally, organizations should review their data protection policies to ensure that any potential information leakage is accounted for in risk assessments and incident response plans.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2022-38689: CWE-200 Information Exposure in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
Description
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
AI-Powered Analysis
Technical Analysis
CVE-2022-38689 is a medium-severity vulnerability identified in telephony services of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are integrated into devices running Android versions 10, 11, and 12. The vulnerability arises due to a missing permission check within the telephony service, which allows a local attacker with limited privileges (low attack complexity and requiring low privileges) to access sensitive information without needing additional execution privileges or user interaction. This flaw is categorized under CWE-200 (Information Exposure), meaning that confidential data can be disclosed to unauthorized entities. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with a vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could allow an attacker to obtain sensitive telephony-related information, potentially including device identifiers, network details, or other private data handled by the telephony service, which could be leveraged for further targeted attacks or privacy violations.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the prevalence of devices using the affected Unisoc chipsets within their operational environment. Unisoc chipsets are commonly found in budget and mid-range smartphones, which may be used by employees or customers. The information disclosure could lead to privacy breaches, exposure of sensitive telephony data, and potential reconnaissance for more advanced attacks such as targeted phishing or device tracking. While the vulnerability does not allow direct code execution or system compromise, the confidentiality breach could undermine trust and compliance with data protection regulations such as GDPR. Organizations relying on mobile devices with these chipsets for critical communications or sensitive data handling could face increased risk of information leakage. Additionally, sectors with high privacy requirements, such as finance, healthcare, and government, may be more sensitive to such exposures. The lack of user interaction and low complexity of exploitation mean that a malicious insider or a compromised local app could exploit this vulnerability relatively easily.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify devices using the affected Unisoc chipsets running Android 10, 11, or 12 within their environment. Since no official patches are currently linked, organizations should monitor vendor and security advisories for updates from Unisoc or device manufacturers. In the interim, restricting installation of untrusted or unnecessary local applications can reduce the risk of exploitation, as the vulnerability requires local access with some privileges. Employing mobile device management (MDM) solutions to enforce strict app permissions and control over telephony-related permissions can help limit exposure. Network segmentation and monitoring for unusual telephony service access patterns may also aid in early detection of exploitation attempts. Encouraging users to update devices promptly when patches become available and considering device replacement for unsupported or unpatchable hardware are longer-term strategies. Additionally, organizations should review their data protection policies to ensure that any potential information leakage is accounted for in risk assessments and incident response plans.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-08-22T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec641
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 10:56:38 AM
Last updated: 7/31/2025, 5:53:14 PM
Views: 12
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.