Skip to main content

CVE-2022-39101: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

High
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 06/21/2025, 23:54:07 UTC

Technical Analysis

CVE-2022-39101 is a high-severity vulnerability identified in the power management service of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000. These chipsets are integrated into devices running Android versions 10, 11, and 12. The core issue is a missing authorization check (CWE-862) within the power management service, which allows an attacker with limited privileges (local access with low privileges) to configure or manipulate power management settings without requiring additional execution privileges or user interaction. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity, with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack requires local access but low attack complexity and privileges, no user interaction, and can impact confidentiality, integrity, and availability to a high degree. The missing permission check could allow an attacker to escalate privileges or disrupt device operation by manipulating power management functions, potentially leading to denial of service, unauthorized data access, or modification. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects a broad range of Unisoc chipsets commonly found in budget and mid-range Android smartphones, particularly in markets where these chipsets are prevalent. The lack of authorization checks in a critical system service like power management poses significant risks, especially if combined with other vulnerabilities or local access vectors such as malicious apps or compromised user environments.

Potential Impact

For European organizations, the impact of CVE-2022-39101 depends largely on the prevalence of devices using affected Unisoc chipsets within their operational environment. Enterprises that deploy Android devices with these chipsets—often in cost-sensitive segments or IoT devices—may face risks of local privilege escalation or service disruption. The vulnerability could allow attackers to manipulate power management, potentially causing device instability, forced reboots, or denial of service, which can disrupt business operations, especially in environments relying on mobile workforce or IoT deployments. Confidentiality and integrity risks arise if attackers leverage this flaw to gain unauthorized access or modify sensitive data on affected devices. Although exploitation requires local access, the absence of user interaction and low privilege requirements increase the risk of exploitation via malicious applications or insider threats. Given the high impact on confidentiality, integrity, and availability, organizations using affected devices should consider this vulnerability a significant threat to mobile security and operational continuity.

Mitigation Recommendations

Identify and inventory all Android devices within the organization that use Unisoc chipsets listed in the vulnerability (SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). Work with device vendors and Unisoc to obtain and deploy firmware or OS updates that include patches for this vulnerability once available. Restrict installation of untrusted or third-party applications on devices with affected chipsets to reduce the risk of local exploitation. Implement mobile device management (MDM) solutions to enforce strict application whitelisting and privilege controls on Android devices. Monitor device behavior for anomalies related to power management, such as unexpected reboots, battery drain, or performance degradation, which may indicate exploitation attempts. Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. For critical environments, consider segmenting or isolating devices with affected chipsets until patches are applied to minimize attack surface. Engage with Unisoc and device manufacturers for timely security advisories and coordinate vulnerability management efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1507

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/21/2025, 11:54:07 PM

Last updated: 8/12/2025, 4:17:01 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats