CVE-2022-39101: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
AI Analysis
Technical Summary
CVE-2022-39101 is a high-severity vulnerability identified in the power management service of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000. These chipsets are integrated into devices running Android versions 10, 11, and 12. The core issue is a missing authorization check (CWE-862) within the power management service, which allows an attacker with limited privileges (local access with low privileges) to configure or manipulate power management settings without requiring additional execution privileges or user interaction. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity, with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack requires local access but low attack complexity and privileges, no user interaction, and can impact confidentiality, integrity, and availability to a high degree. The missing permission check could allow an attacker to escalate privileges or disrupt device operation by manipulating power management functions, potentially leading to denial of service, unauthorized data access, or modification. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects a broad range of Unisoc chipsets commonly found in budget and mid-range Android smartphones, particularly in markets where these chipsets are prevalent. The lack of authorization checks in a critical system service like power management poses significant risks, especially if combined with other vulnerabilities or local access vectors such as malicious apps or compromised user environments.
Potential Impact
For European organizations, the impact of CVE-2022-39101 depends largely on the prevalence of devices using affected Unisoc chipsets within their operational environment. Enterprises that deploy Android devices with these chipsets—often in cost-sensitive segments or IoT devices—may face risks of local privilege escalation or service disruption. The vulnerability could allow attackers to manipulate power management, potentially causing device instability, forced reboots, or denial of service, which can disrupt business operations, especially in environments relying on mobile workforce or IoT deployments. Confidentiality and integrity risks arise if attackers leverage this flaw to gain unauthorized access or modify sensitive data on affected devices. Although exploitation requires local access, the absence of user interaction and low privilege requirements increase the risk of exploitation via malicious applications or insider threats. Given the high impact on confidentiality, integrity, and availability, organizations using affected devices should consider this vulnerability a significant threat to mobile security and operational continuity.
Mitigation Recommendations
Identify and inventory all Android devices within the organization that use Unisoc chipsets listed in the vulnerability (SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). Work with device vendors and Unisoc to obtain and deploy firmware or OS updates that include patches for this vulnerability once available. Restrict installation of untrusted or third-party applications on devices with affected chipsets to reduce the risk of local exploitation. Implement mobile device management (MDM) solutions to enforce strict application whitelisting and privilege controls on Android devices. Monitor device behavior for anomalies related to power management, such as unexpected reboots, battery drain, or performance degradation, which may indicate exploitation attempts. Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. For critical environments, consider segmenting or isolating devices with affected chipsets until patches are applied to minimize attack surface. Engage with Unisoc and device manufacturers for timely security advisories and coordinate vulnerability management efforts.
Affected Countries
Germany, France, Italy, Spain, Poland, United Kingdom, Netherlands, Belgium, Sweden, Czech Republic
CVE-2022-39101: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
Description
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
AI-Powered Analysis
Technical Analysis
CVE-2022-39101 is a high-severity vulnerability identified in the power management service of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000. These chipsets are integrated into devices running Android versions 10, 11, and 12. The core issue is a missing authorization check (CWE-862) within the power management service, which allows an attacker with limited privileges (local access with low privileges) to configure or manipulate power management settings without requiring additional execution privileges or user interaction. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity, with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack requires local access but low attack complexity and privileges, no user interaction, and can impact confidentiality, integrity, and availability to a high degree. The missing permission check could allow an attacker to escalate privileges or disrupt device operation by manipulating power management functions, potentially leading to denial of service, unauthorized data access, or modification. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects a broad range of Unisoc chipsets commonly found in budget and mid-range Android smartphones, particularly in markets where these chipsets are prevalent. The lack of authorization checks in a critical system service like power management poses significant risks, especially if combined with other vulnerabilities or local access vectors such as malicious apps or compromised user environments.
Potential Impact
For European organizations, the impact of CVE-2022-39101 depends largely on the prevalence of devices using affected Unisoc chipsets within their operational environment. Enterprises that deploy Android devices with these chipsets—often in cost-sensitive segments or IoT devices—may face risks of local privilege escalation or service disruption. The vulnerability could allow attackers to manipulate power management, potentially causing device instability, forced reboots, or denial of service, which can disrupt business operations, especially in environments relying on mobile workforce or IoT deployments. Confidentiality and integrity risks arise if attackers leverage this flaw to gain unauthorized access or modify sensitive data on affected devices. Although exploitation requires local access, the absence of user interaction and low privilege requirements increase the risk of exploitation via malicious applications or insider threats. Given the high impact on confidentiality, integrity, and availability, organizations using affected devices should consider this vulnerability a significant threat to mobile security and operational continuity.
Mitigation Recommendations
Identify and inventory all Android devices within the organization that use Unisoc chipsets listed in the vulnerability (SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). Work with device vendors and Unisoc to obtain and deploy firmware or OS updates that include patches for this vulnerability once available. Restrict installation of untrusted or third-party applications on devices with affected chipsets to reduce the risk of local exploitation. Implement mobile device management (MDM) solutions to enforce strict application whitelisting and privilege controls on Android devices. Monitor device behavior for anomalies related to power management, such as unexpected reboots, battery drain, or performance degradation, which may indicate exploitation attempts. Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. For critical environments, consider segmenting or isolating devices with affected chipsets until patches are applied to minimize attack surface. Engage with Unisoc and device manufacturers for timely security advisories and coordinate vulnerability management efforts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-09-01T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf1507
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/21/2025, 11:54:07 PM
Last updated: 2/7/2026, 9:32:53 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.