Skip to main content

CVE-2022-39100: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

High
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 06/21/2025, 23:54:20 UTC

Technical Analysis

CVE-2022-39100 is a high-severity vulnerability identified in the power management service of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820) as well as S8000. These chipsets are integrated into devices running Android versions 10, 11, and 12. The vulnerability stems from a missing authorization check (CWE-862) within the power management service, which allows an attacker with limited privileges (local access with low privileges) to configure or manipulate power management settings without requiring additional execution privileges or user interaction. The CVSS 3.1 base score of 7.8 reflects the high impact on confidentiality, integrity, and availability, with the attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). Exploiting this vulnerability could allow an attacker to escalate privileges, disrupt device power management functions, potentially causing denial of service, or gain unauthorized control over system components. Although no known exploits are currently reported in the wild, the vulnerability's nature and affected widespread Android versions make it a significant risk, especially for devices using Unisoc chipsets. The lack of a patch link suggests that mitigation may rely on vendor firmware updates or security patches yet to be widely distributed. This vulnerability highlights the critical need for proper authorization checks in system-level services, particularly those managing hardware functions like power management, to prevent unauthorized configuration changes that can compromise device security and stability.

Potential Impact

For European organizations, the impact of CVE-2022-39100 can be substantial, particularly for those relying on mobile devices or embedded systems powered by Unisoc chipsets running Android 10 to 12. The vulnerability allows local attackers to bypass authorization controls in power management services, potentially leading to privilege escalation and unauthorized control over device power states. This can result in denial of service through power mismanagement, unauthorized data access or modification, and disruption of critical mobile operations. Organizations with mobile workforces, IoT deployments, or embedded Android devices in operational technology environments may face increased risk of device compromise, data breaches, or operational downtime. Given the high confidentiality, integrity, and availability impacts, exploitation could facilitate lateral movement within corporate networks or enable persistent footholds on devices. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits targeting this vulnerability. The impact is amplified in sectors with stringent security requirements such as finance, healthcare, and critical infrastructure, where device reliability and data protection are paramount.

Mitigation Recommendations

1. Prioritize firmware and security patch updates from device manufacturers and Unisoc that address CVE-2022-39100. Engage with vendors to confirm patch availability and deployment timelines. 2. Implement strict device usage policies limiting local access to trusted personnel only, reducing the risk of local exploitation. 3. Employ mobile device management (MDM) solutions to monitor and control device configurations, detect anomalous power management behavior, and enforce security policies. 4. Conduct regular security audits and penetration testing focusing on devices with Unisoc chipsets to identify potential exploitation attempts. 5. For critical environments, consider network segmentation and endpoint protection measures that restrict lateral movement from compromised devices. 6. Educate users on the risks of unauthorized local access and enforce strong authentication mechanisms to prevent privilege escalation. 7. Monitor security advisories from Unisoc and Android security bulletins for updates or emerging exploit reports related to this vulnerability. 8. Where possible, disable or restrict access to power management services or interfaces that are not essential for device operation to reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1503

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/21/2025, 11:54:20 PM

Last updated: 8/15/2025, 2:26:26 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats