Skip to main content

CVE-2022-39098: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

High
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 06/21/2025, 19:24:54 UTC

Technical Analysis

CVE-2022-39098 is a high-severity vulnerability identified in the power management service of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T310, T606, T610, T612, T616, T618, T760, T770, T820, and S8000. These chipsets are integrated into devices running Android versions 10, 11, and 12. The root cause of the vulnerability is a missing authorization check (CWE-862) within the power management service. This flaw allows an attacker with limited privileges (low-level privileges) to configure or manipulate the power management service without requiring additional execution privileges or user interaction. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity, with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack requires local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). Exploitation could lead to unauthorized control over power management functions, potentially allowing privilege escalation, denial of service, or unauthorized data access. Although no known exploits are currently reported in the wild, the vulnerability’s nature and impact make it a significant risk, especially in environments where affected devices are widely deployed. The absence of patch links suggests that either patches are not publicly available or are distributed through OEM updates, emphasizing the need for vigilance in device management and updates. The affected chipsets are commonly used in budget and mid-range smartphones and IoT devices, which may be prevalent in various markets globally, including Europe.

Potential Impact

For European organizations, the impact of CVE-2022-39098 can be substantial, particularly for enterprises and sectors relying on devices powered by Unisoc chipsets running Android 10-12. The vulnerability enables local attackers with limited privileges to manipulate power management services, potentially leading to privilege escalation, unauthorized data access, or denial of service. This can compromise device confidentiality, integrity, and availability, affecting mobile workforce productivity, secure communications, and operational continuity. Critical sectors such as telecommunications, manufacturing, healthcare, and public services that utilize affected devices could face increased risks of targeted attacks or insider threats exploiting this vulnerability. Additionally, the vulnerability could be leveraged as a foothold for further lateral movement within corporate networks if compromised devices are connected to internal systems. The lack of user interaction requirement and low complexity of exploitation increase the risk profile. Given the widespread use of Android devices in Europe, especially in small and medium enterprises that may not have robust mobile device management, the vulnerability could be exploited to disrupt business operations or exfiltrate sensitive information. Furthermore, IoT devices using these chipsets in industrial or smart city deployments could experience service interruptions or unauthorized control, impacting critical infrastructure and services.

Mitigation Recommendations

1. Prioritize identifying and inventorying all devices within the organization that use Unisoc chipsets listed as affected (SC9863A, SC9832E, SC7731E, T310, T606, T610, T612, T616, T618, T760, T770, T820, S8000) running Android 10, 11, or 12. 2. Engage with device manufacturers and vendors to obtain and apply official security patches or firmware updates addressing CVE-2022-39098 as soon as they become available. 3. Implement strict local access controls on devices, restricting physical and logical access to trusted personnel only, to reduce the risk of local exploitation. 4. Deploy mobile device management (MDM) solutions that can enforce security policies, monitor device integrity, and remotely update or disable vulnerable devices. 5. Monitor device behavior for anomalies related to power management services, such as unexpected changes in power states or service configurations, which could indicate exploitation attempts. 6. Educate users and administrators about the risks of local privilege escalation vulnerabilities and enforce policies to prevent installation of unauthorized applications or services that could leverage this flaw. 7. For IoT deployments, segment networks to isolate vulnerable devices and limit their communication to only necessary services, reducing the attack surface. 8. Conduct regular security assessments and penetration testing focusing on mobile and IoT devices to detect potential exploitation of this vulnerability. 9. Collaborate with cybersecurity information sharing groups within Europe to stay informed about emerging exploits and mitigation strategies related to Unisoc chipset vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf58c6

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 6/21/2025, 7:24:54 PM

Last updated: 8/17/2025, 10:05:54 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats